THURSDAY July 23, 3:30pm - 5:00pm |
KEYWORD: CONTEST
EVENT TYPE: DESIGNER TRACK
SESSION 49
Hack@DAC: Catch Me If You Can
Organizers:
Ahmad-Reza Sadeghi - Technische Univ. Darmstadt
Dan Holcomb - Univ. of Massachusetts
Jeyavijayan Rajendran - Texas A&M Univ.
System-on-a-Chip (SoC) designers use third-party intellectual property (3PIP) cores and in-house IP cores to design SoCs. Trustworthiness of such SoCs is undermined by security bugs unintentionally introduced during the integration of these IPs. Each SoC has its own defined usage scenario and corresponding security objectives. When exploited, a security weakness often results in compromise or bypass of at least one of the product security objectives. As it has been in the past attacks may lead to a system failure or deadlock, or create a side-channel to remotely access sensitive information (e.g., cryptographic keys), or gain privileged access to the system enabling them to bypass the security mechanisms in place and compromise the whole computing platform. The goal of this competition is to develop practical and effective solutions and computer-aided tools to identify such vulnerabilities in buggy SoCs.