-0.7 C
Casper
Sunday, March 9, 2025

Caspia’s CODAx Discovers 16 Security Violations in OpenRISC

Must read

Caspia’s CODAx linter detects 16 security flaws in OpenRISC, enhancing security in SoC design with AI-driven static checks and faster, more efficient analysis.

Caspia Technologies, a pioneer in the development of AI-enhanced security verification solutions for advanced SoCs and systems, today announced details of the impact of its security linter called CODAx. The company reported that 16 security violations were found in a popular OpenRISC CPU core. This open-source core has been deployed in a variety of embedded applications, including telecommunications, portable media, home entertainment, and automotive.

CODAx uses over 150 security rules to perform comprehensive static checking on design RTL to flag code that can lead to security vulnerabilities. The CODAx rules benefit from Caspia Technologies security LLMs trained with the latest vulnerabilities, threat models and security AI agents. The easy-to-use tool analyzes the control and data-path portions of a design with a large and growing database of security rules. CODAx provides more secure and robust end products while enabling more efficient design flows with reduced time-to-market and lower secure development costs.

Also Read: Cybersecurity Overhaul: Why Your Strategy Needs a GenAI Upgrade

Approximately 32,000 lines of code in the OpenRISC CPU core were analyzed. CODAx detected six violations of control path security directives and 10 violations of data-path security directives. In contrast, the golden reference linter currently in use throughout the industry found only two of the 16 violations flagged by CODAx, illustrating the unique value of this new class of security linter. The complete analysis using CODAx took under 60 seconds.

Example vulnerabilities found include:

  1. Insecure state encoding schemes and transitions for finite state machines in the design. This practice can make the state machines susceptible to fault injection attacks and improper leakage of sensitive information.
  2. Improper initialized data-path registers upon reset. If these registers are left uninitialized, their state becomes undefined when the design is first brought out of reset. During this vulnerable window, before the registers are explicitly initialized by the logic, the design operates in an insecure state, increasing the risk of exploitation.

Caspia Technologies is actively engaging with approximately seven leading semiconductor technology suppliers spanning industries such as wireless, AI, AMS, DSP, automotive, and processor platforms, to demonstrate the value of CODAx and subsequently strengthen the security portion of the development flow.

Today’s security issues are addressed manually. Implementing a CODAx solution will enhance the productivity of the security team while addressing vulnerability attacks before they happen. As a result, the entire design flow will be more efficient while reducing the costs for running security tests.

Also Read: Zero Trust Now Extends to Backup Systems Amid Ransomware Surge

“CODAx is the first solution in a robust roadmap of solutions that enhances design security and product assurance across the entire electronic development and delivery flow,” said Dr. Mark Tehranipoor, Department Chair & Intel Charles E. Young Chair in Cybersecurity at the University of Florida, and co-founder of Caspia Technologies. “I am delighted with the strong interest we are seeing in the market for CODAx and the significant demonstration of capability we achieved with the OpenRISC CPU analysis.”

More articles

Latest posts