Security vulnerability analysis of Integrated Circuits using conventional design-time validation and verification techniques (like simulations, emulations, etc.) is generally a computationally intensive task and incomplete by nature, especially under limited resources and time constraints. To overcome this limitation, we propose a novel methodology based on model checking to formally analyze security vulnerabilities in sequential circuits while considering side-channel parameters like propagation delay, switching power, and leakage power. In particular, we present a novel algorithm to efficiently partition the state-space into corresponding smaller state-spaces to enable distributed security analysis of complex sequential circuits and thereby mitigating the associated state-space explosion due to their feedback loops. We analyze multiple ISCAS89 and trust-hub benchmarks to demonstrate the efficacy of our framework in identifying security vulnerabilities. The experimental results show that ForASec successfully performs the complete analysis of the given complex and large sequential circuits, and provides approximately 11x to 16x speedup in analysis time compared to state-of-the-art model checking-based techniques. Moreover, it also identifies the number of gates required by an HT that can go undetected for a given design and variability conditions.
翻译:为了克服这一限制,我们提议基于模型检查的新方法,以正式分析相继电路的安全脆弱性,同时考虑侧通道参数,如传播延迟、转换功率和泄漏功率;特别是,我们提出了一个新的算法,将州空间有效分割成相应的较小州空间,以便能够对复杂的相继电路进行分散的安全分析,从而减轻因反馈回路而产生的相关州空间爆炸。我们分析了多种ISCAS89和信任枢纽基准,以显示我们在确定安全脆弱性方面的框架的功效。实验结果表明,ASCE成功地对给定的复杂和大型相继电路进行了全面分析,并提供了大约11x至16x速度的分析时间,与基于状态的模型检查技术相比,提供了大约11x至16x速度的分析时间。此外,它还确定了HT所需的门数量,这些门可以对特定设计和变异性条件进行未探测。