2022
DOI: 10.1145/3492345
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing Security Vulnerabilities Induced by High-level Synthesis

Abstract: High-level synthesis (HLS) is essential to map the high-level language (HLL) description (e.g., in C/C++) of hardware design to the corresponding Register Transfer Level (RTL) to produce hardware-independent design specifications with reduced design complexity for ASICs and FPGAs. Adopting HLS is crucial for industrial and government applications to lower development costs, verification efforts, and time-to-market. Current research practices focus on optimizing HLS for performance, power, and area constraints.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…Another concern is the unintentional introduction of security weaknesses in HLS-generated designs [5]. Design weaknesses are flaws in a design that, if exploited, can lead to vulnerabilities.…”
Section: Background and Prior Work A Hls-induced Security Weaknessesmentioning
confidence: 99%
See 3 more Smart Citations
“…Another concern is the unintentional introduction of security weaknesses in HLS-generated designs [5]. Design weaknesses are flaws in a design that, if exploited, can lead to vulnerabilities.…”
Section: Background and Prior Work A Hls-induced Security Weaknessesmentioning
confidence: 99%
“…MITRE maintains a list of known weaknesses called the Common Weakness Enumeration (CWE) [11]. Some vulnerabilities identified by Pundir et al [5] map to the following CWEs: CWE 1245 (insecure finite state machine); CWE 1300 (improper protection of side channel); CWE 1271 (uninitialized value on reset for registers holding security settings); CWE 1189 (improper isolation of shared resources on system-on-a-chip); CWE 203 (Observable discrepancy). Of these weaknesses, we focus on CWE 203, as it may enable other weaknesses, like uninitialized values on reset or unbalanced pipelines, to leak sensitive data during operation.…”
Section: Background and Prior Work A Hls-induced Security Weaknessesmentioning
confidence: 99%
See 2 more Smart Citations