Skip to main content

Data Flow Verification in SoC Using Formal Techniques

  • Conference paper
  • First Online:
Advances in Communication, Signal Processing, VLSI, and Embedded Systems

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 614))

  • 967 Accesses

Abstract

Hardware security is becoming increasingly critical in SoC designs. A SoC integrates several modules to form a larger system. To reduce the time-to-market and design efforts, reusable, pretested modules called intellectual properties (IPs) are incorporated in the design. Hence, designing mainly relies on interconnection of modules that may lead to unintentional functional paths. As SoC may contain several secure and non-secure modules, data propagation in the design must be carefully analyzed. There exist various forms of security attacks like tampering, repudiation and privilege elevation. These attacks may affect system manufacturers, system designers or the end users. A designer invests a lot on design in terms of both money and time, and SoC protection becomes highly important. Security Path Verification (SPV) App of JasperGold Tool by Cadence is used to check the sanctity of the data in the design. SPV uses formal techniques to verify the data propagation in the design.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Potkonjak M, Qu G, Koushanfar F, Chang CH (2017) 20 Years of research on intellectual property protection. In: 2017 IEEE international symposium on circuits and systems (ISCAS). IEEE, pp 1–4

    Google Scholar 

  2. Rajendran J, Dhandayuthapany AM, Vedula V, Karri R (2016) Formal security verification of third party intellectual property cores for information leakage. In: 2016 29th international conference on VLSI design and 2016 15th international conference on embedded systems (VLSID). IEEE, pp 547–552

    Google Scholar 

  3. Sen L, Roy A, Bhattacharjee S, Mittra B, Roy SK (2010) DFT logic verification through property based formal methods: SOC to IP. In: Proceedings of the 2010 conference on formal methods in computer-aided design. FMCAD Inc., pp 33–34

    Google Scholar 

  4. Liao WS, Hsiung PA (2003) FVP: a formal verification platform for SoC. In: Proceedings of IEEE international SOC conference (systems-on-chip), 2003. IEEE, pp 21–24

    Google Scholar 

  5. Stoffel D (2009) Formal verification of systems-on-chip-industrial experiences and scientific perspectives. In: 2009 20th international workshop on database and expert systems application. IEEE, pp 3-3

    Google Scholar 

  6. Basu A, Mallick R, Sur S, Sarkar SK (2012) On the implementation of a intellectual property protection based on information hiding. In: 2012 5th international conference on computers and devices for communication (CODEC). IEEE, pp 1–4

    Google Scholar 

  7. Hély D, Rosenfeld K, Karri R (2011) Security challenges during VLSI test. In: 2011 IEEE 9th international new circuits and systems conference (NEWCAS). IEEE, pp 486–489

    Google Scholar 

  8. Zhang J (2016) A practical logic obfuscation technique for hardware security. IEEE Trans VLSI Syst 24(3):1193–1197

    Article  Google Scholar 

  9. Wang X, Zheng Y, Basak A, Bhunia S (2015) IIPS: infrastructure IP for secure SoC design. IEEE Trans Comput 64(8):2226–2238

    Article  MathSciNet  Google Scholar 

  10. Hanna Z (2014) Challenging problems in industrial formal verification. In: 2014 formal methods in computer-aided design (FMCAD). IEEE, pp 1-1

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. S. Asha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Asha, K.S., Mendonca, O.S., Bhandarkar, R., Srinivas, R. (2020). Data Flow Verification in SoC Using Formal Techniques. In: Kalya, S., Kulkarni, M., Shivaprakasha, K. (eds) Advances in Communication, Signal Processing, VLSI, and Embedded Systems. Lecture Notes in Electrical Engineering, vol 614. Springer, Singapore. https://doi.org/10.1007/978-981-15-0626-0_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-0626-0_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-0625-3

  • Online ISBN: 978-981-15-0626-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics