Abstract
Hardware security is becoming increasingly critical in SoC designs. A SoC integrates several modules to form a larger system. To reduce the time-to-market and design efforts, reusable, pretested modules called intellectual properties (IPs) are incorporated in the design. Hence, designing mainly relies on interconnection of modules that may lead to unintentional functional paths. As SoC may contain several secure and non-secure modules, data propagation in the design must be carefully analyzed. There exist various forms of security attacks like tampering, repudiation and privilege elevation. These attacks may affect system manufacturers, system designers or the end users. A designer invests a lot on design in terms of both money and time, and SoC protection becomes highly important. Security Path Verification (SPV) App of JasperGold Tool by Cadence is used to check the sanctity of the data in the design. SPV uses formal techniques to verify the data propagation in the design.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Potkonjak M, Qu G, Koushanfar F, Chang CH (2017) 20 Years of research on intellectual property protection. In: 2017 IEEE international symposium on circuits and systems (ISCAS). IEEE, pp 1–4
Rajendran J, Dhandayuthapany AM, Vedula V, Karri R (2016) Formal security verification of third party intellectual property cores for information leakage. In: 2016 29th international conference on VLSI design and 2016 15th international conference on embedded systems (VLSID). IEEE, pp 547–552
Sen L, Roy A, Bhattacharjee S, Mittra B, Roy SK (2010) DFT logic verification through property based formal methods: SOC to IP. In: Proceedings of the 2010 conference on formal methods in computer-aided design. FMCAD Inc., pp 33–34
Liao WS, Hsiung PA (2003) FVP: a formal verification platform for SoC. In: Proceedings of IEEE international SOC conference (systems-on-chip), 2003. IEEE, pp 21–24
Stoffel D (2009) Formal verification of systems-on-chip-industrial experiences and scientific perspectives. In: 2009 20th international workshop on database and expert systems application. IEEE, pp 3-3
Basu A, Mallick R, Sur S, Sarkar SK (2012) On the implementation of a intellectual property protection based on information hiding. In: 2012 5th international conference on computers and devices for communication (CODEC). IEEE, pp 1–4
Hély D, Rosenfeld K, Karri R (2011) Security challenges during VLSI test. In: 2011 IEEE 9th international new circuits and systems conference (NEWCAS). IEEE, pp 486–489
Zhang J (2016) A practical logic obfuscation technique for hardware security. IEEE Trans VLSI Syst 24(3):1193–1197
Wang X, Zheng Y, Basak A, Bhunia S (2015) IIPS: infrastructure IP for secure SoC design. IEEE Trans Comput 64(8):2226–2238
Hanna Z (2014) Challenging problems in industrial formal verification. In: 2014 formal methods in computer-aided design (FMCAD). IEEE, pp 1-1
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Asha, K.S., Mendonca, O.S., Bhandarkar, R., Srinivas, R. (2020). Data Flow Verification in SoC Using Formal Techniques. In: Kalya, S., Kulkarni, M., Shivaprakasha, K. (eds) Advances in Communication, Signal Processing, VLSI, and Embedded Systems. Lecture Notes in Electrical Engineering, vol 614. Springer, Singapore. https://doi.org/10.1007/978-981-15-0626-0_2
Download citation
DOI: https://doi.org/10.1007/978-981-15-0626-0_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0625-3
Online ISBN: 978-981-15-0626-0
eBook Packages: EngineeringEngineering (R0)