Property Specific Information Flow Analysis for Hardware Security Verification

被引:28
作者
Hu, Wei [1 ]
Ardeshiricham, Armaiti [2 ]
Gobulukoglu, Mustafa S. [2 ]
Wang, Xinmu [1 ]
Kastner, Ryan [2 ]
机构
[1] Northwestern Polytech Univ, Xian 710072, Shaanxi, Peoples R China
[2] Univ Calif San Diego, La Jolla, CA 92093 USA
来源
2018 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD) DIGEST OF TECHNICAL PAPERS | 2018年
基金
美国国家科学基金会;
关键词
Hardware security; security verification; information flow analysis; security property; design methodology; TRACKING;
D O I
10.1145/3240765.3240839
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Hardware information flow analysis detects security vulnerabilities resulting from unintended design flaws, timing channels, and hardware Trojans. These information flow models are typically generated in a general way, which includes a significant amount of redundancy that is irrelevant to the specified security properties. In this work, we propose a property specific approach for information flow security. We create information flow models tailored to the properties to be verified by performing a property specific search to identify security critical paths. This helps find suspicious signals that require closer inspection and quickly eliminates portions of the design that are free of security violations. Our property specific trimming technique reduces the complexity of the security model; this accelerates security verification and restricts potential security violations to a smaller region which helps quickly pinpoint hardware security vulnerabilities.
引用
收藏
页数:8
相关论文
共 28 条
[1]  
Andreou A, 2017, 2017 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), P155, DOI 10.1109/HST.2017.7951819
[2]  
[Anonymous], 2016, EXTRACTING QUALCOMMS
[3]  
Ardeshiricham A, 2017, ICCAD-IEEE ACM INT, P147, DOI 10.1109/ICCAD.2017.8203772
[4]  
Ardeshiricham A, 2017, DES AUT TEST EUROPE, P1691, DOI 10.23919/DATE.2017.7927266
[5]  
Deng S., 2017, IACR CRYPTOLOGY EPRI
[6]  
Fern N, 2017, ASIA S PACIF DES AUT, P598, DOI 10.1109/ASPDAC.2017.7858389
[7]  
Goguen J. A., 1982, Proceedings of the 1982 Symposium on Security and Privacy, P11
[8]   Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically [J].
Hicks, Matthew ;
Finnicum, Murph ;
King, Samuel T. ;
Martin, Milo M. K. ;
Smith, Jonathan M. .
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, :159-172
[9]   Towards Property Driven Hardware Security [J].
Hu, Wei ;
Althoff, Alric ;
Ardeshiricham, Armaiti ;
Kastner, Ryan .
2016 17TH INTERNATIONAL WORKSHOP ON MICROPROCESSOR AND SOC TEST AND VERIFICATION (MTV), 2016, :51-56
[10]   Detecting Hardware Trojans with Gate-Level Information-Flow Tracking [J].
Hu, Wei ;
Mao, Baolei ;
Oberg, Jason ;
Kastner, Ryan .
COMPUTER, 2016, 49 (08) :44-52