Goli, MehranHassan, MuhammadGroße, DanielDrechsler, Rolf2021-06-212021-06-212019https://dl.gi.de/handle/20.500.12116/36638Modern System-on-Chips (SoCs) are notoriously insecure. Hence, the fundamental security feature of IP isolation is heavily used, e. g., secured Memory Mapped IOs (MMIOs), or secured address ranges in case of memories, are marked as non-accessible. One way to provide strong assurance of security is to define isolation as information flow policy in hardware using the notion of non-interference. Since, an insecure hardware opens up the door for attacks across the entire system stack (from software down to hardware), the security validation process should start as early as possible in the SoC design cycle, i. e. at Electronic System Level (ESL). Hence, in this paper we propose the first dynamic information flow analysis at ESL. Our approach allows to validate the run-time behavior of a given SoC implemented using Virtual Prototypes (VPs) against security threat models, such as information leakage (confidentiality) and unauthorized access to data in a memory (integrity). Experiments show the applicability and efficacy of the proposed method on various VPs including a real-world system.enSecurity validationIFTGDBNon-intrusiveVirtual prototypeSystemCSecurity validation of VP-based SoCs using dynamic information flow trackingText/Journal Article10.1515/itit-2018-00272196-7032