ASPIRE: An Intermediate Representation for Abstract Security Policies

被引:0
作者
Bhamidipati, Padmaja [1 ]
Vemuri, Ranga [1 ]
机构
[1] Univ Cincinnati, ECE Dept, Digital Design Environm Lab, Cincinnati, OH 45221 USA
来源
2023 36TH INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2023 22ND INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS, VLSID | 2023年
基金
美国国家科学基金会;
关键词
Vulnerabilities; security analysis; security policy; System-on-Chip; SystemVerilog Assertions;
D O I
10.1109/VLSID57277.2023.00046
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern System-on-Chip (SoC) architectures include various Intellectual Property (IP) cores that are security-sensitive. In order to protect the design against malicious attacks, every new SoC has to undergo the laborious process of identifying the security assets that are relevant to the existing security policies and rules. Unfortunately, very little research has been done in exploiting the potential of abstraction for specification of security policies. We introduce ASPIRE, an Abstract Security Policy Intermediate Representation, which specifies Temporal Logic and Information Flow security policies in a generalized format. In the ASPIRE methodology, we develop an abstract architecture and formulate ASPIRE for Abstract Security Policies (ASP) based on the abstract architecture. This abstract architecture is developed using the security assets that are identified from the abstract security policies. Further, an equivalence check is conducted for the ASPIRE representations related to abstract and concrete architectures in order to generate SystemVerilog Assertions (SVAs) to verify the concrete architectures. We demonstrate this methodology using several security policies for multiple test cases including OpenRISC-SoC, CVA6, Wishbone Bus, MUX, and AES-T100.
引用
收藏
页码:175 / 180
页数:6
相关论文
共 17 条
  • [1] Efficient Methods for SoC Trust Validation Using Information Flow Verification
    Alatoun, Khitam M.
    Achyutha, Shanmukha Murali
    Vemuri, Ranga
    [J]. 2021 IEEE 39TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2021), 2021, : 608 - 616
  • [2] [Anonymous], OPENRISC 1200 RISC D
  • [3] Ardeshiricham A, 2017, DES AUT TEST EUROPE, P1691, DOI 10.23919/DATE.2017.7927266
  • [4] Security Analysis of a System-on-Chip Using Assertion-Based Verification
    Bhamidipati, Padmaja
    Achyutha, Shanmukha Murali
    Vemur, Ranga
    [J]. 2021 IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2021, : 826 - 831
  • [5] Cadence, JASPERGOLD FORM VER
  • [6] Farahmandi F., 2019, SYSTEM CHIP SECURITY, P221
  • [7] github.com, CVA6 RISC V CPU
  • [8] Guo XL, 2019, PROCEEDINGS OF THE 2019 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), P91, DOI 10.1109/HST.2019.8740840
  • [9] IEEE, 2018, IEEE Std 1800-2017 (Revision of IEEE Std 1800-2012, P1, DOI DOI 10.1109/IEEESTD.2018.8299595
  • [10] III J.W.G., 1992, J COMPUT SECUR, V1, P255