Property Based Formal Security Verification for Hardware Trojan Detection

被引:0
作者
Qin, Maoyuan [1 ]
Hu, Wei [1 ]
Mu, Dejun [1 ]
Tai, Yu [1 ]
机构
[1] Northwestern Polytech Univ, Sch Automat, Xian 710072, Shaanxi, Peoples R China
来源
2018 IEEE 3RD INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW) | 2018年
关键词
Hardware security; information flow analysis; Coq; formal verification; hardware Trojan; INFORMATION-FLOW TRACKING; DATA SECRECY PROTECTION; FRAMEWORK;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The design of modern computer hardware heavily relies on third-party intellectual property (IP) cores, which may contain malicious hardware Trojans that could be exploited by an adversary to leak secret information or take control of the system. Existing hardware Trojan detection methods either require a golden reference design for comparison or extensive functional testing to identify suspicious signals. In this paper, we propose a new formal verification method to verify the security of hardware designs. The proposed solution formalizes fine grained gate level information flow model for proving security properties of hardware designs in the Coq theorem prover environment. Compare with existing register transfer level (RTL) information flow security models, our model only needs to translate a small number of logic primitives to their formal representations without the need of supporting the rich RTL HDL semantics or dealing with complex conditional branch or loop structures. As a result, a gate level information flow model can be created at much lower complexity while achieving significantly higher precision in modeling the security behavior of hardware designs. We use the AES-T1700 benchmark from Trust-HUB to demonstrate the effectiveness of our solution. Experimental results show that our method can detect and pinpoint the Trojan.
引用
收藏
页码:62 / 67
页数:6
相关论文
共 23 条
[1]   The hunt for the kill switch [J].
Adee, Sally .
IEEE SPECTRUM, 2008, 45 (05) :34-39
[2]  
[Anonymous], BREAKTHROUGH SILICON
[3]   Data Secrecy Protection Through Information Flow Tracking in Proof-Carrying Hardware IP-Part II: Framework Automation [J].
Bidmeshki, Mohammad-Mahdi ;
Guo, Xiaolong ;
Dutta, Raj Gautam ;
Jin, Yier ;
Makris, Yiorgos .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (10) :2430-2443
[4]  
Bidmeshki MM, 2015, 2015 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), P163, DOI 10.1109/HST.2015.7140256
[5]  
Coquand T., 1984, COQ
[6]  
Guo X., 2015, P 52 ANN DESIGN AUTO, P145
[7]  
Guo X., 2016, INT WORKSH MICR SOC, P48
[8]   Automatic Code Converter Enhanced PCH Framework for SoC Trust Verification [J].
Guo, Xiaolong ;
Dutta, Raj Gautam ;
Mishra, Prabhat ;
Jin, Yier .
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2017, 25 (12) :3390-3400
[9]   Gate-Level Information Flow Tracking for Security Lattices [J].
Hu, Wei ;
Mu, Dejun ;
Oberg, Jason ;
Mao, Baolei ;
Tiwari, Mohit ;
Sherwood, Timothy ;
Kastner, Ryan .
ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2014, 20 (01) :1-25
[10]   On the Complexity of Generating Gate Level Information Flow Tracking Logic [J].
Hu, Wei ;
Oberg, Jason ;
Irturk, Ali ;
Tiwari, Mohit ;
Sherwood, Timothy ;
Mu, Dejun ;
Kastner, Ryan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) :1067-1080