{"id":2535,"date":"2022-10-24T16:14:42","date_gmt":"2022-10-24T16:14:42","guid":{"rendered":"http:\/\/cad4security.org\/?page_id=2535"},"modified":"2022-10-24T16:47:38","modified_gmt":"2022-10-24T16:47:38","slug":"pre-silicon","status":"publish","type":"page","link":"http:\/\/cad4security.org\/index.php\/special-calls\/pre-silicon\/","title":{"rendered":"Pre-silicon Security Sign-off Solutions Through Design Cycle"},"content":{"rendered":"<div data-colibri-id=\"1191-c1\" class=\"style-747 style-local-1191-c1 position-relative\">\n  <!----><p><\/p>\n<div data-colibri-component=\"section\" data-colibri-id=\"1191-c2\" id=\"initial-content\" class=\"h-section h-section-global-spacing d-flex align-items-lg-center align-items-md-center align-items-center style-748 style-local-1191-c2 position-relative\">\n    <!----><br>\n    <!----><p><\/p>\n<div class=\"h-section-grid-container h-section-boxed-container\">\n      <!----><p><\/p>\n<div data-colibri-id=\"1191-c3\" class=\"h-row-container gutters-row-lg-2 gutters-row-md-2 gutters-row-0 gutters-row-v-lg-2 gutters-row-v-md-2 gutters-row-v-2 style-749 style-local-1191-c3 position-relative\">\n        <!----><p><\/p>\n<div class=\"h-row justify-content-lg-center justify-content-md-center justify-content-center align-items-lg-stretch align-items-md-stretch align-items-stretch gutters-col-lg-2 gutters-col-md-2 gutters-col-0 gutters-col-v-lg-2 gutters-col-v-md-2 gutters-col-v-2\">\n          <!----><p><\/p>\n<div class=\"h-column h-column-container d-flex h-col-lg-auto h-col-md-auto h-col-auto style-750-outer style-local-1191-c4-outer\">\n<div data-colibri-id=\"1191-c4\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-2 h-px-md-2 h-px-2 v-inner-lg-2 v-inner-md-2 v-inner-2 style-750 style-local-1191-c4 position-relative\">\n              <!----><br>\n              <!----><p><\/p>\n<div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n                <!----><p><\/p>\n<div data-colibri-id=\"1191-c5\" class=\"style-751 style-local-1191-c5 position-relative h-element\">\n                  <!----><p><\/p>\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n<h1 class=\"has-text-align-center wp-block-heading\"><strong>ACM Journal on Emerging Technologies in Computing Systems<\/strong><\/h1>\n\n\n\n<p class=\"has-text-align-center has-colibri-color-6-color has-text-color\"><em><span style=\"color:#000000\" class=\"has-inline-color\">Special issue on CAD for Security: Pre-silicon Security Sign-off Solutions Through Design Cycle<\/span><\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><span style=\"color:#000000\" class=\"has-inline-color\">Guest Editors<\/span><\/strong><\/h2>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0);color:#000000\" class=\"has-inline-color\"><strong>Farimah Farahmandi<\/strong>, University of Florida, <a href=\"mailto:farimah@ece.ufl.edu\">farimah@ece.ufl.edu<\/a><br><strong>Ankur Sirvastava<\/strong>, University of Maryland, <a href=\"mailto:ankurs@umd.edu\">ankurs@umd.edu<\/a><br><strong>Giorgio Di Natali<\/strong>, TIMA Laboratory, University of Grenoble, <a href=\"mailto:giorgio.di-natale@univ-grenoble-alpes.fr\">giorgio.di-natale@univ-grenoble-alpes.fr<\/a><br><strong>Mark Tehranipoor<\/strong>, University of Florida, <a href=\"mailto:tehranipoor@ece.ufl.edu\">tehranipoor@ece.ufl.edu<\/a><\/mark><\/p>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0);color:#000000\" class=\"has-inline-color\">Security vulnerabilities in hardware designs are of major concerns since it is almost impossible to patch them once they are fabricated and deployed in the field. Recent studies have shown many vulnerabilities in SoC implementations, including side-channel leakage, information leakage, access control violations, malicious change, etc. These attacks can effectively bypass the security mechanisms built at the software level and put chips or systems at major risk. Ensuring the security of modern SoC designs is challenging due to their complexity, aggressive time-to-market demands, and the variety of attacks introduced against hardware designs. Given the wide usage of SoCs in mission-critical applications, it is critical to ensure their security before deployment. However, most of the existing solutions lack automation and rely on manual approaches and design reviews that are not efficient nor scalable. The semiconductor industry and system integrators are looking for a set of metrics, reusable security solutions, and automatic computer-aided design (CAD) tools to aid analysis, identifying, root-causing, and mitigating SoC security problems.<\/mark><\/p>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0);color:#000000\" class=\"has-inline-color\">Vulnerabilities in SoCs are due to design mistakes, lack of security understanding by designers, design transformations, increased attack surfaces, and malicious intents. Further, exiting CAD tools are used in SoC design flow can introduce additional vulnerabilities in the SoCs unintentionally. For example, some design practices\/choices may make the design vulnerable to timing and power side-channel leakage. Not only will these vulnerabilities move from one level of abstraction to another, but unique vulnerabilities can also be introduced during design transformations. For example, an RTL design with power side-channel issues can suffer from access control issues when it is synthesized to gate-level, and design-for debug infrastructure will be inserted. Therefore, it is essential to have automatic CAD solutions to be able to analyze the security of SoCs in a comprehensive manner, in all levels of abstractions, and against all existing threats (e.g., fault-injection, side-channel, and hardware Trojan<br>attacks). CAD tools should be able to access the security of the design in the pre-silicon stage and suggest possible countermeasures while still it is possible to modify the design and address the potential vulnerabilities. Finally, addressing a security vulnerability at the later stages of the design and fabrication process would cost 10X more than the previous stage, hence it is of utmost importance to address the vulnerabilities at the higher levels of abstractions to provide higher flexibility and lower the total cost of mitigation.<\/mark><\/p>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0);color:#000000\" class=\"has-inline-color\">Considering the above challenges and potential solutions, the scope of this Special Issue of ACM<\/mark> <mark style=\"background-color:rgba(0, 0, 0, 0);color:#000000\" class=\"has-inline-color\">JETC calls for<\/mark> <mark style=\"background-color:rgba(0, 0, 0, 0);color:#000000\" class=\"has-inline-color\">automatic CAD solutions for security sign-off in all levels of abstractions (i.e., C\/C++, RTL, gate-level, and layout) which include the following but not limited to:<\/mark><\/p>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0);color:#000000\" class=\"has-inline-color\">\u2022 Power-side channel vulnerability assessment and countermeasures<br>\u2022 Timing-side channel vulnerability assessment and countermeasures<br>\u2022 Electromagnetic radiation vulnerability assessment and countermeasures<br>\u2022 Fault-injection vulnerability evaluation and countermeasures<br>\u2022 Automatic security property generation<br>\u2022 Security equivalence checking between different design abstractions<br>\u2022 Security equivalence checking between different SoCs<br>\u2022 Optical\/microprobing\/nanoprobing vulnerability assessment and countermeasures<br>\u2022 (Anti-)Reverse engineering and physical attacks<br>\u2022 FPGA Bitstream protection and vulnerabilities<br>\u2022 Trojans and backdoors: Detection and prevention<br>\u2022 Information leakage assessment and countermeasures<br>\u2022 Physical data extraction and countermeasures<br>\u2022 Finite statement machine hardening<br>\u2022 Automated physical assurance solutions<\/mark><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><span style=\"color:#000000\" class=\"has-inline-color\">Submission Guidelines<\/span><\/strong><\/h2>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0);color:#000000\" class=\"has-inline-color\">All original manuscripts or revisions to the ACM JETC must be submitted online at <a href=\"https:\/\/mc.manuscriptcentral.com\/jetc\">https:\/\/mc.manuscriptcentral.com\/jetc<\/a>. The author guidelines for ACM JETC can be found at <\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-colibri-color-1-color\"><a href=\"https:\/\/dl.acm.org\/journal\/jetc\/author-guidelines\">https:\/\/dl.acm.org\/journal\/jetc\/author-guidelines<\/a><\/mark><mark style=\"background-color:rgba(0, 0, 0, 0);color:#000000\" class=\"has-inline-color\">. To make sure that your article will be considered for this special issue, you need to select the submission type as &#8220;SI: CAD for Hardware Security&#8221;. Authors must also mention the same in their submission cover letter.<\/mark><\/p>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0);color:#000000\" class=\"has-inline-color\">Submitted articles must not have been previously published or currently submitted for publication elsewhere. For previously published conference papers, it is required that submissions to the special issue have at least 30% new content. Submissions that do not meet this requirement will be summarily rejected.<\/mark><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><span style=\"color:#000000\" class=\"has-inline-color\">Important Dates<\/span><\/strong><\/h2>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0);color:#000000\" class=\"has-inline-color\">\u2022 Submissions deadline: November 1, 2021<br>\u2022 First-round review decisions: January 2022<br>\u2022 Deadline for revision submissions: February 2022<br>\u2022 Notification of final decisions: April 2022<br>\u2022 Tentative publication: 2022<\/mark><\/p>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0);color:#000000\" class=\"has-inline-color\">For further information, please contact Farimah Farahmandi at <a href=\"mailto:farimah@ece.ufl.edu\">farimah@ece.ufl.edu<\/a> and Mark Tehranipoor at <a href=\"mailto:tehranipoor@ece.ufl.edu\">tehranipoor@ece.ufl.edu<\/a>.<\/mark><\/p>\n","protected":false},"excerpt":{"rendered":"<p>ACM Journal on Emerging Technologies in Computing Systems Special issue on CAD for Security: Pre-silicon Security Sign-off Solutions Through Design Cycle Guest Editors Farimah Farahmandi, University of Florida, farimah@ece.ufl.eduAnkur Sirvastava, University of Maryland, ankurs@umd.eduGiorgio Di Natali, TIMA Laboratory, University of Grenoble, giorgio.di-natale@univ-grenoble-alpes.frMark Tehranipoor, University of Florida, tehranipoor@ece.ufl.edu Security vulnerabilities in hardware designs are of major &hellip;<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":1191,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"acf":[],"_links":{"self":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/2535"}],"collection":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/comments?post=2535"}],"version-history":[{"count":4,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/2535\/revisions"}],"predecessor-version":[{"id":2546,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/2535\/revisions\/2546"}],"up":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/1191"}],"wp:attachment":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media?parent=2535"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}