-
公开(公告)号:US11657159B2
公开(公告)日:2023-05-23
申请号:US17072162
申请日:2020-10-16
Applicant: International Business Machines Corporation
Inventor: Matthew Michael Garcia Pardini , Bodo Hoppe , Zoltan Tibor Hidvegi , Michael P Mullen
CPC classification number: G06F21/577 , G06F11/3447 , G06F21/606 , G06F21/62
Abstract: Aspects of the invention include systems and methods for to detecting security vulnerabilities using modeled attribute propagation. A non-limited example of a computer-implemented method includes generating a model of a device under test, the model comprising a data path similar to the device under test and an attribute network. The method further includes detecting protected data that is introduced into the model and marking the protected data with an attribute. An end point of the marked protected data is detected along the data path. In response to the end point being indicative of a vulnerability, an alert is issued.
-
公开(公告)号:US10896118B2
公开(公告)日:2021-01-19
申请号:US16369107
申请日:2019-03-29
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Ophir Erez , Bodo Hoppe , Divya K. Joshi , Gerrit Koch , Parminder Singh
Abstract: Verifying architectural compliance of a processor core using processor-sparing functions. A simulation of a model for a register-transfer level design of the processor core is performed. A first state of the model is dumped, when no error exists. An error is injected in the model. A second state of the model is dumped, after the injected error is detected in the simulation. Upon dumping the second state, the model is reset and initialized with the first state. State information of the second state is loaded in the reset and initialized model.
-
公开(公告)号:US20210157963A1
公开(公告)日:2021-05-27
申请号:US16692129
申请日:2019-11-22
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Sean Michael Carey , Richard Frank Rizzolo , Bodo Hoppe , Divya Kumudprakash Joshi , Paul Jacob Logsdon , Sreekala Anandavally , WILLIAM RURIK
IPC: G06F30/3312
Abstract: A non-limiting example of a computer-implemented method for error injection includes executing a pre-silicon operation on a simulated chip verifying that a plurality of latches from a timing simulation set error checkers when run against a manufacturing test suite in order to generate a cross-reference file containing latch entries in a table. It executes a first post-silicon operation on a hardware chip based on the simulated chip to determine empirically that timing latches from logic built-in self tests (“LBIST”) trigger the same error checkers set by the plurality of latches verified in the simulated chip. The method updates the cross-reference file based on the results of the determination. The method executes a second post-silicon operation on the hardware chip to improve chip frequency by working around functional checkers using the cross-reference file and updating the cross-reference file based on the results of the improving.
-
公开(公告)号:US10430311B2
公开(公告)日:2019-10-01
申请号:US14919764
申请日:2015-10-22
Applicant: International Business Machines Corporation
Inventor: Sascha Eckmann , Thomas Gardelegen , Wolfgang Gellerich , Bodo Hoppe
Abstract: A simulation environment benchmarks processors to determine processor performance. A benchmark program is instrumented with a microarchitecture instruction. A first clock cycle indicative of a processor before executing the benchmark program is captured. The benchmark program is executed and a processor return related to the microarchitecture instruction is intercepted. In response to the processor return, a second clock cycle indicative of the processor after executing the benchmark program is captured. The simulation environment determines the performance of the processor from the first clock cycle and the second clock cycle.
-
公开(公告)号:US20180239691A1
公开(公告)日:2018-08-23
申请号:US15440601
申请日:2017-02-23
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Ophir Erez , Bodo Hoppe , Divya K. Joshi , Gerrit Koch , Parminder Singh
IPC: G06F11/36
CPC classification number: G06F11/3636
Abstract: Verifying architectural compliance of a processor core using processor-sparing functions. A simulation of a model for a register-transfer level design of the processor core is performed. A first state of the model is dumped, when no error exists. An error is injected in the model. A second state of the model is dumped, after the injected error is detected in the simulation. Upon dumping the second state, the model is reset and initialized with the first state. State information of the second state is loaded in the reset and initialized model.
-
公开(公告)号:US09600616B1
公开(公告)日:2017-03-21
申请号:US15264336
申请日:2016-09-13
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Eli Arbel , Erez Barak , Bodo Hoppe , Udo Krautz , Shiri Moran
CPC classification number: G06F17/504 , G06F17/5022 , G06F17/5036 , G06F17/505
Abstract: A computer-implemented method may include retrieving a design netlist with a processor, identifying, via the processor, a logic structure in the design netlist, generating, via the processor, a driver based on the logic structure, applying, via the processor, a simulation and a formal model based on the driver, and testing, via the processor, an output of the simulation and the formal model.
-
公开(公告)号:US20160070933A1
公开(公告)日:2016-03-10
申请号:US14944885
申请日:2015-11-18
Applicant: International Business Machines Corporation
Inventor: Benedikt Geukes , Bodo Hoppe , Matteo Michel , Juergen Wakunda
IPC: G06F21/72 , G06F21/76 , G01R31/3177
CPC classification number: G06F21/72 , G01R31/31719 , G01R31/3177 , G01R31/318588 , G06F21/76
Abstract: Some embodiments include a method for processing a scan chain in an integrated circuit, the method comprising receiving, in the integrated circuit, the scan chain, wherein the scan chain includes a secret key pattern; separating the secret key pattern from the scan chain; storing the scan chain in a first plurality of latches; storing the secret key pattern in a second plurality of latches; comparing the secret key pattern to a reference key pattern, the reference key pattern stored in a third plurality of latches; determining, based on the comparing the secret key pattern to the reference key pattern, that the secret key pattern does not match the reference key pattern; and generating a signal indicating that the secret key pattern does not match the reference key pattern.
Abstract translation: 一些实施例包括用于处理集成电路中的扫描链的方法,所述方法包括在所述集成电路中接收所述扫描链,其中所述扫描链包括秘密密钥图案; 将秘密密钥图案与扫描链分离; 将扫描链存储在第一多个锁存器中; 将所述秘密密钥图案存储在第二多个锁存器中; 将所述秘密密钥图案与参考密钥图案进行比较,所述参考密钥图案存储在第三多个锁存器中; 基于将所述秘密密钥图案与所述参考密钥图案进行比较来确定所述秘密密钥图案与所述参考密钥图案不匹配; 以及产生指示所述秘密密钥图案与所述参考键图案不匹配的信号。
-
公开(公告)号:US11501047B2
公开(公告)日:2022-11-15
申请号:US16692129
申请日:2019-11-22
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Sean Michael Carey , Richard Frank Rizzolo , Bodo Hoppe , Divya Kumudprakash Joshi , Paul Jacob Logsdon , Sreekala Anandavally , William Rurik
IPC: G06F30/3312
Abstract: A non-limiting example of a computer-implemented method for error injection includes executing a pre-silicon operation on a simulated chip verifying that a plurality of latches from a timing simulation set error checkers when run against a manufacturing test suite in order to generate a cross-reference file containing latch entries in a table. It executes a first post-silicon operation on a hardware chip based on the simulated chip to determine empirically that timing latches from logic built-in self tests (“LBIST”) trigger the same error checkers set by the plurality of latches verified in the simulated chip. The method updates the cross-reference file based on the results of the determination. The method executes a second post-silicon operation on the hardware chip to improve chip frequency by working around functional checkers using the cross-reference file and updating the cross-reference file based on the results of the improving.
-
公开(公告)号:US20220121752A1
公开(公告)日:2022-04-21
申请号:US17072162
申请日:2020-10-16
Applicant: International Business Machines Corporation
Abstract: Aspects of the invention include systems and methods for to detecting security vulnerabilities using modeled attribute propagation. A non-limited example of a computer-implemented method includes generating a model of a device under test, the model comprising a data path similar to the device under test and an attribute network. The method further includes detecting protected data that is introduced into the model and marking the protected data with an attribute. An end point of the marked protected data is detected along the data path. In response to the end point being indicative of a vulnerability, an alert is issued.
-
公开(公告)号:US20190227906A1
公开(公告)日:2019-07-25
申请号:US16369107
申请日:2019-03-29
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Ophir Erez , Bodo Hoppe , Divya K. Joshi , Gerrit Koch , Parminder Singh
IPC: G06F11/36
Abstract: Verifying architectural compliance of a processor core using processor-sparing functions. A simulation of a model for a register-transfer level design of the processor core is performed. A first state of the model is dumped, when no error exists. An error is injected in the model. A second state of the model is dumped, after the injected error is detected in the simulation. Upon dumping the second state, the model is reset and initialized with the first state. State information of the second state is loaded in the reset and initialized model.
-
-
-
-
-
-
-
-
-