Using Security Invariant to Verify Confidentiality in Hardware Design

被引:1
|
作者
Kong, Shuyu [1 ]
Shen, Yuanqi [1 ]
Zhou, Hai [1 ]
机构
[1] Northwestern Univ, Evanston, IL 60208 USA
来源
PROCEEDINGS OF THE GREAT LAKES SYMPOSIUM ON VLSI 2017 (GLSVLSI' 17) | 2017年
关键词
INFORMATION-FLOW;
D O I
10.1145/3060403.3060456
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the increasing complexity of design process, outsourcing, and use of third-party blocks, it becomes harder and harder to prevent Trojan insertion and other malicious design modifications. In this paper, we propose to deploy security invariant as carried proof to prevent and detect Trojans and malicious attacks and to ensure the security of hardware design. Non-interference with down-grading policy is checked for confidentiality. Contrary to existing approaches by type checking, we develop a method to model-check a simple safety property on a composed machine. Down-grading is handled in a better way in model-checking and the effectiveness of our approach is demonstrated on various Verilog benchmarks.
引用
收藏
页码:487 / 490
页数:4
相关论文
共 12 条
  • [1] Quantitative Analysis of Timing Channel Security in Cryptographic Hardware Design
    Mao, Baolei
    Hu, Wei
    Althoff, Alric
    Matai, Janarbek
    Tai, Yu
    Mu, Dejun
    Sherwood, Timothy
    Kastner, Ryan
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2018, 37 (09) : 1719 - 1732
  • [2] Torbit: Design of an open source security flaw measurement suite
    Fourney, Robert S.
    Hanson, Austin D.
    JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2009, 9 (01) : S137 - S147
  • [3] Using Security Policies to Write Secure Software
    Myers, Andrew C.
    LOGICS AND LANGUAGES FOR RELIABILITY AND SECURITY, 2010, 25 : 225 - 261
  • [4] Formal verification and security analysis of FastDFS using process algebra
    Hou, Zhiru
    Zhu, Huibiao
    INTERNET OF THINGS, 2025, 31
  • [5] Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec
    Houmb, Siv Hilde
    Islam, Shareeful
    Knauss, Eric
    Jurjens, Jan
    Schneider, Kurt
    REQUIREMENTS ENGINEERING, 2010, 15 (01) : 63 - 93
  • [6] Towards an Implementation of Information Flow Security using Semantic Web Technologies
    Ureche, Oana
    Layton, Robert
    Watters, Paul
    2012 THIRD CYBERCRIME AND TRUSTWORTHY COMPUTING WORKSHOP (CTC 2012), 2012, : 75 - 80
  • [7] CommCSL: Proving Information Flow Security for Concurrent Programs using Abstract Commutativity
    Eilers, Marco
    Dardinier, Thibault
    Mueller, Peter
    PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2023, 7 (PLDI):
  • [8] Solving design management problems using lean design management: the role of trust
    Uusitalo, Petteri
    Seppanen, Olli
    Peltokorpi, Antti
    Olivieri, Hylton
    ENGINEERING CONSTRUCTION AND ARCHITECTURAL MANAGEMENT, 2019, 26 (07) : 1387 - 1405
  • [9] Design Office Control using Information Technology (DOCIT)
    Hodgins, DJ
    GLOBALIZATION OF MANUFACTURING IN THE DIGITAL COMMUNICATIONS ERA OF THE 21ST CENTURY: INNOVATION, AGILITY, AND THE VIRTUAL ENTERPRISE, 1998, : 93 - 105
  • [10] Privacy and data security for grid-connected home area network using Internet of Things
    Manimuthu, Arunmozhi
    Ramesh, Ramadoss
    IET NETWORKS, 2018, 7 (06) : 445 - 452