Gate-Level Information Flow Tracking for Security Lattices

被引:28
作者
Hu, Wei [1 ]
Mu, Dejun [1 ]
Oberg, Jason [2 ]
Mao, Baolei [3 ]
Tiwari, Mohit [4 ]
Sherwood, Timothy [5 ]
Kastner, Ryan [6 ]
机构
[1] Northwestern Polytech Univ, Sch Automat, Xian, Shaanxi, Peoples R China
[2] Univ Calif San Diego, Dept Comp Sci & Engn, La Jolla, CA 92093 USA
[3] Northwestern Polytech Univ, Sch Automat, Xian, Shaanxi, Peoples R China
[4] Univ Texas Austin, Dept Elect & Comp Engn, Austin, TX 78712 USA
[5] Univ Calif Santa Barbara, Dept Comp Sci, Santa Barbara, CA 93106 USA
[6] Univ Calif San Diego, Dept Comp Sci & Engn, La Jolla, CA 92093 USA
基金
美国国家科学基金会;
关键词
Security; Design; Verification; High-assurance system; hardware security; gate-level information flow tracking; multilevel security; security lattice; formal method;
D O I
10.1145/2676548
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
High-assurance systems found in safety-critical infrastructures are facing steadily increasing cyber threats. These critical systems require rigorous guarantees in information flow security to prevent confidential information from leaking to an unclassified domain and the root of trust from being violated by an untrusted party. To enforce bit-tight information flow control, gate-level information flow tracking (GLIFT) has recently been proposed to precisely measure and manage all digital information flows in the underlying hardware, including implicit flows through hardware-specific timing channels. However, existing work in this realm either restricts to two-level security labels or essentially targets two-input primitive gates and several simple multilevel security lattices. This article provides a general way to expand the GLIFT method for multilevel security. Specifically, it formalizes tracking logic for an arbitrary Boolean gate under finite security lattices, presents a precise tracking logic generation method for eliminating false positives in GLIFT logic created in a constructive manner, and illustrates application scenarios of GLIFT for enforcing multilevel information flow security. Experimental results show various trade-offs in precision and performance of GLIFT logic created using different methods. It also reveals the area and performance overheads that should be expected when expanding GLIFT for multilevel security.
引用
收藏
页码:1 / 25
页数:25
相关论文
共 38 条
[1]  
Aciicmez O., 2006, Topics in Cryptology-CT-RSA 2007. The Cryptographers' Track at the RAS Conference 2007. Proceedings (Lecture Notes in Computer Science Vol.4377), P225
[2]  
[Anonymous], 1973, SECURE COMPUTER SYST
[3]  
[Anonymous], 2011, 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services, DOI [DOI 10.1109/HEALTH.2011.6026732, 10.1109/HEALTH.2011.6026732]
[4]  
[Anonymous], 2007, ACM SIGOPS OPERATING
[5]  
BARRETT P, 1987, LECT NOTES COMPUT SC, V263, P311
[6]   A case study in hardware Trojan design and implementation [J].
Baumgarten, Alex ;
Steffen, Michael ;
Clausman, Matthew ;
Zambreno, Joseph .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (01) :1-14
[7]  
Checkoway S., 2011, USENIX SEC S, V4, P447
[8]  
Dalton M, 2007, CONF PROC INT SYMP C, P482, DOI 10.1145/1273440.1250722
[9]  
Denning D.E.R., 1982, CRYPTOGRAPHY DATA SE, V112, DOI [10.5555/539308, DOI 10.5555/539308]
[10]   LATTICE MODEL OF SECURE INFORMATION-FLOW [J].
DENNING, DE .
COMMUNICATIONS OF THE ACM, 1976, 19 (05) :236-243