Emulation-based System-on-Chip Security Verification: Challenges and Opportunities
Tanvir Rahman, Shuvagata Saha, Ahmed Y. Alhurubi, Sujan Kumar Saha, Farimah Farahmandi + 1 more
TLDR
This paper surveys emulation-based SoC security verification, detailing methods, challenges, and future directions for pre-silicon hardware assurance.
Key contributions
- Surveys emulation-based SoC security verification, categorizing prior work across six key areas.
- Details emulation workflows including instrumentation, stimulus generation, and runtime monitoring.
- Identifies practical challenges like observability, scalability, and defining security coverage metrics.
- Explores emerging directions: AI-assisted emulation, digital security twins, and cloud-scale secure emulation.
Why it matters
SoCs face growing security risks due to complexity and third-party IP, which traditional verification struggles to address. This paper highlights hardware emulation as a critical pre-silicon solution. It provides a foundational understanding and roadmap for advancing SoC security assurance.
Original Abstract
Increasing system-on-chip (SoC) heterogeneity, deep hardware/software integration, and the proliferation of third-party intellectual property (IP) have brought security validation to the forefront of semiconductor design. While simulation and formal verification remain indispensable, they often struggle to expose vulnerabilities that emerge only under realistic execution conditions, long software-driven interactions, and adversarial stimuli. In this context, hardware emulation is emerging as an increasingly important pre-silicon verification technology because it enables higher-throughput execution of RTL designs under realistic hardware/software workloads while preserving sufficient fidelity for security-oriented analysis. This paper presents a comprehensive survey and perspective on emulation-based security verification and validation. We organize the landscape of prior work across assertion-based security checking, coverage-driven exploration, adversarial testing, information-flow tracking, fault injection, and side-channel-oriented evaluation. We provide a structured view of emulation-enabled security verification workflows, including instrumentation, stimulus generation, runtime monitoring, and evidence-driven analysis. We also examine practical challenges related to observability, scalability, property specification, and the definition of security-oriented coverage metrics for emulation-based verification. Finally, we discuss emerging directions such as AI-assisted emulation, digital security twins, chiplet-scale security exploration, automated vulnerability assessment, and cloud-scale secure emulation. Overall, this paper positions emulation as a promising foundation for the next generation of pre-silicon hardware security assurance.
📬 Weekly AI Paper Digest
Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.