{"id":4639,"date":"2023-09-05T19:23:15","date_gmt":"2023-09-05T19:23:15","guid":{"rendered":"http:\/\/cad4security.org\/?page_id=4639"},"modified":"2024-06-03T18:05:28","modified_gmt":"2024-06-03T18:05:28","slug":"riscv-vulnerability-details","status":"publish","type":"page","link":"http:\/\/cad4security.org\/index.php\/riscv-vulnerability-details\/","title":{"rendered":"SoC Vulnerability Database"},"content":{"rendered":"\n<p class=\"is-style-subheading has-text-color has-links-color\">Welcome to the SoC Vulnerability Database Page!<\/p>\n\n\n\n<p class=\"has-sm-font-size has-xxl-margin-bottom\" style=\"font-style:normal;font-weight:200;letter-spacing:2px\">This effort aims to provide researchers and practitioners from academia and industry with a set of vulnerabilities in SoC (System on Chip) based on security objectives in hardware to perform various experimental analyses. In the future, we are planning to provide a variety of categories that are intended to simplify navigation, browsing, and mapping.<\/p>\n\n\n\n\n<p><strong>&#8220;Please cite the following paper if you use the SoC vulnerability database in your work.&#8221;\u00a0<\/strong><\/p>\n\n\n\n<p>S. Tarek, H. A. Shaikh, S. R. Rajendran and F. Farahmandi, &#8220;Benchmarking of SoC-Level Hardware Vulnerabilities: A Complete Walkthrough,&#8221; <em>2023 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)<\/em>, Foz do Iguacu, Brazil, 2023, pp. 1-6,<a href=\"https:\/\/ieeexplore.ieee.org\/document\/10238612\" data-type=\"link\" data-id=\"https:\/\/ieeexplore.ieee.org\/document\/10238612\"> doi: 10.1109\/ISVLSI59464.2023.10238612.<\/a><\/p>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-layout-1 wp-block-group-is-layout-flex\">\n<p class=\"has-text-align-center\">Contributors: Shams Tarek, Sree Ranjani Rajendran\u00a0, Mark Tehranipoor, Farimah Farahmandi\u00a0<\/p>\n<\/div>\n\n\n\n\n\n<p><em>For any information, please send an email to shams.tarek@ufl.edu.<\/em><\/p>\n\n\n\n\n<div class=\"mai-grid entries entries-grid has-boxed has-image-center\" style=\"--entry-title-font-size:var(--font-size-lg);--align-text:center;--entry-meta-text-align:center;\"><div class=\"entries-wrap has-columns\" style=\"--columns-xs:1\/1;--columns-sm:1\/1;--columns-md:1\/3;--columns-lg:1\/3;--flex-xs:0 0 var(--flex-basis);--flex-sm:0 0 var(--flex-basis);--flex-md:0 0 var(--flex-basis);--flex-lg:0 0 var(--flex-basis);--column-gap:var(--spacing-lg);--row-gap:var(--spacing-lg);--align-columns:start;\"><article class=\"entry entry-grid is-column has-entry-link has-image page type-page\" style=\"--entry-index:1;\" aria-label=\"SoC Vulnerability #1\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><div class=\"entry-wrap entry-wrap-grid\"><h3 class=\"entry-title\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/riscv-vulnerability-details\/soc-vulnerability-1\/\" rel=\"bookmark\">SoC Vulnerability #1<\/a><\/h3>\n<a class=\"entry-image-link\" href=\"http:\/\/cad4security.org\/index.php\/riscv-vulnerability-details\/soc-vulnerability-1\/\" tabindex=\"-1\" aria-hidden=\"true\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"300\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/automation-400x300.jpg\" class=\"entry-image size-landscape-sm\" alt=\"\" \/><\/a><div class=\"entry-excerpt\"><p>CWE-ID: &#8211; 1198<br \/>\nHardware-based isolation and access control (e.g., identity, policy, locking control) of sensitive shared hardware resources such as registers and fuses, and information leakage.\u00a0\u00a0\u00a0<\/p>\n<\/div><div class=\"entry-more\"><a class=\"entry-more-link button button-small\" href=\"http:\/\/cad4security.org\/index.php\/riscv-vulnerability-details\/soc-vulnerability-1\/\">Read more<span class=\"screen-reader-text\">SoC Vulnerability #1<\/span><\/a><\/div><\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image page type-page\" style=\"--entry-index:2;\" aria-label=\"SoC Vulnerability #2\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><div class=\"entry-wrap entry-wrap-grid\"><h3 class=\"entry-title\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/riscv-vulnerability-details\/soc-vulnerability-2\/\" rel=\"bookmark\">SoC Vulnerability #2<\/a><\/h3>\n<a class=\"entry-image-link\" href=\"http:\/\/cad4security.org\/index.php\/riscv-vulnerability-details\/soc-vulnerability-2\/\" tabindex=\"-1\" aria-hidden=\"true\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"300\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/automation-400x300.jpg\" class=\"entry-image size-landscape-sm\" alt=\"\" \/><\/a><div class=\"entry-excerpt\"><p>CWE-ID: &#8211; 266<br \/>\nHardware-based isolation and access control (e.g., identity, policy, locking control) of sensitive shared hardware resources such as registers and fuses, and information leakage.\u00a0\u00a0\u00a0<\/p>\n<\/div><div class=\"entry-more\"><a class=\"entry-more-link button button-small\" href=\"http:\/\/cad4security.org\/index.php\/riscv-vulnerability-details\/soc-vulnerability-2\/\">Read more<span class=\"screen-reader-text\">SoC Vulnerability #2<\/span><\/a><\/div><\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image page type-page\" style=\"--entry-index:3;\" aria-label=\"SoC Vulnerability #3\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><div class=\"entry-wrap entry-wrap-grid\"><h3 class=\"entry-title\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/riscv-vulnerability-details\/soc-vulnerability-3\/\" rel=\"bookmark\">SoC Vulnerability #3<\/a><\/h3>\n<a class=\"entry-image-link\" href=\"http:\/\/cad4security.org\/index.php\/riscv-vulnerability-details\/soc-vulnerability-3\/\" tabindex=\"-1\" aria-hidden=\"true\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"300\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/automation-400x300.jpg\" class=\"entry-image size-landscape-sm\" alt=\"\" \/><\/a><div class=\"entry-excerpt\"><p>CWE-ID: &#8211; 1198<br \/>\nHardware-based isolation and access control (e.g., identity, policy, locking control) of sensitive shared hardware resources such as registers and fuses, and information leakage.\u00a0\u00a0\u00a0<\/p>\n<\/div><div class=\"entry-more\"><a class=\"entry-more-link button button-small\" href=\"http:\/\/cad4security.org\/index.php\/riscv-vulnerability-details\/soc-vulnerability-3\/\">Read more<span class=\"screen-reader-text\">SoC Vulnerability #3<\/span><\/a><\/div><\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image page type-page\" style=\"--entry-index:4;\" aria-label=\"SoC Vulnerability #4\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><div class=\"entry-wrap entry-wrap-grid\"><h3 class=\"entry-title\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/riscv-vulnerability-details\/soc-vulnerability-4\/\" rel=\"bookmark\">SoC Vulnerability #4<\/a><\/h3>\n<a class=\"entry-image-link\" href=\"http:\/\/cad4security.org\/index.php\/riscv-vulnerability-details\/soc-vulnerability-4\/\" tabindex=\"-1\" aria-hidden=\"true\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"300\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/automation-400x300.jpg\" class=\"entry-image size-landscape-sm\" alt=\"\" \/><\/a><div class=\"entry-excerpt\"><p>CWE-ID: &#8211; 1272<br \/>\nHardware-based isolation and access control (e.g., identity, policy, locking control) of sensitive shared hardware resources such as registers and fuses, and information leakage.\u00a0\u00a0\u00a0<\/p>\n<\/div><div class=\"entry-more\"><a class=\"entry-more-link button button-small\" href=\"http:\/\/cad4security.org\/index.php\/riscv-vulnerability-details\/soc-vulnerability-4\/\">Read more<span class=\"screen-reader-text\">SoC Vulnerability #4<\/span><\/a><\/div><\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image page type-page\" style=\"--entry-index:5;\" aria-label=\"SoC Vulnerability #5\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><div class=\"entry-wrap entry-wrap-grid\"><h3 class=\"entry-title\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/riscv-vulnerability-details\/soc-vulnerability-5\/\" rel=\"bookmark\">SoC Vulnerability #5<\/a><\/h3>\n<a class=\"entry-image-link\" href=\"http:\/\/cad4security.org\/index.php\/riscv-vulnerability-details\/soc-vulnerability-5\/\" tabindex=\"-1\" aria-hidden=\"true\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"300\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/automation-400x300.jpg\" class=\"entry-image size-landscape-sm\" alt=\"\" \/><\/a><div class=\"entry-excerpt\"><p>CWE-ID: &#8211; 1262<br \/>\nUnauthorized page access request in the memory management unit (MMU)<\/p>\n<\/div><div class=\"entry-more\"><a class=\"entry-more-link button button-small\" href=\"http:\/\/cad4security.org\/index.php\/riscv-vulnerability-details\/soc-vulnerability-5\/\">Read more<span class=\"screen-reader-text\">SoC Vulnerability #5<\/span><\/a><\/div><\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image page type-page\" style=\"--entry-index:6;\" aria-label=\"SoC Vulnerability #6\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><div class=\"entry-wrap entry-wrap-grid\"><h3 class=\"entry-title\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/riscv-vulnerability-details\/soc-vulnerability-6\/\" rel=\"bookmark\">SoC Vulnerability #6<\/a><\/h3>\n<a class=\"entry-image-link\" href=\"http:\/\/cad4security.org\/index.php\/riscv-vulnerability-details\/soc-vulnerability-6\/\" tabindex=\"-1\" aria-hidden=\"true\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"300\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/automation-400x300.jpg\" class=\"entry-image size-landscape-sm\" alt=\"\" \/><\/a><div class=\"entry-excerpt\"><p>CWE-ID: &#8211; 1262<br \/>\nIllegal Physical Memory Protection (PMP) unit access after mismatch<\/p>\n<\/div><div class=\"entry-more\"><a class=\"entry-more-link button button-small\" href=\"http:\/\/cad4security.org\/index.php\/riscv-vulnerability-details\/soc-vulnerability-6\/\">Read more<span class=\"screen-reader-text\">SoC Vulnerability #6<\/span><\/a><\/div><\/div><\/article><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Welcome to the SoC Vulnerability Database Page! This effort aims to provide researchers and practitioners from academia and industry with a set of vulnerabilities in SoC (System on Chip) based on security objectives in hardware to perform various experimental analyses. In the future, we are planning to provide a variety of categories that are intended &hellip;<\/p>\n","protected":false},"author":10,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"acf":[],"_links":{"self":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/4639"}],"collection":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/comments?post=4639"}],"version-history":[{"count":31,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/4639\/revisions"}],"predecessor-version":[{"id":5294,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/4639\/revisions\/5294"}],"wp:attachment":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media?parent=4639"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}