Using Security Invariant to Verify Confidentiality in Hardware Design

被引:1
|
作者
Kong, Shuyu [1 ]
Shen, Yuanqi [1 ]
Zhou, Hai [1 ]
机构
[1] Northwestern Univ, Evanston, IL 60208 USA
关键词
INFORMATION-FLOW;
D O I
10.1145/3060403.3060456
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the increasing complexity of design process, outsourcing, and use of third-party blocks, it becomes harder and harder to prevent Trojan insertion and other malicious design modifications. In this paper, we propose to deploy security invariant as carried proof to prevent and detect Trojans and malicious attacks and to ensure the security of hardware design. Non-interference with down-grading policy is checked for confidentiality. Contrary to existing approaches by type checking, we develop a method to model-check a simple safety property on a composed machine. Down-grading is handled in a better way in model-checking and the effectiveness of our approach is demonstrated on various Verilog benchmarks.
引用
收藏
页码:487 / 490
页数:4
相关论文
共 50 条
  • [1] Using B to specify, verify and design hardware circuits (Extended abstract)
    Sorensen, IH
    ZUM '98: THE Z FORMAL SPECIFICATION NOTATION, 1998, 1493 : 60 - 65
  • [2] Using a hardware model checker to verify software
    Edwards, SA
    Ma, T
    Damiano, R
    2001 4TH INTERNATIONAL CONFERENCE ON ASIC PROCEEDINGS, 2001, : 85 - 90
  • [3] Design of Software Rejuvenation for CPS Security Using Invariant Sets
    Romagnoli, Raffaele
    Krogh, Bruce H.
    Sinopoli, Bruno
    2019 AMERICAN CONTROL CONFERENCE (ACC), 2019, : 3740 - 3745
  • [4] Hardware and Software Design for Automotive Security
    Bansod, Gaurav
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (09): : 32 - 37
  • [5] Hardware and Software Design for Automotive Security
    Bansod, Gaurav
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (09): : 74 - 79
  • [6] A Multidimensional Hardware Trojan Design Platform to Enhance Hardware Security
    Das, Nilanjana
    Hasler, Mattis
    Pauls, Friedrich
    Haas, Sebastian
    IEEE EMBEDDED SYSTEMS LETTERS, 2025, 17 (01) : 46 - 49
  • [7] Using SPIN to verify security properties of cryptographic protocols
    Maggi, P
    Sisto, R
    MODEL CHECKING SOFTWARE, PROCEEDINGS, 2002, 2318 : 187 - 204
  • [8] Security by design: Hardware-based Security in Windows 8
    EMEA, United Kingdom
    Souren, J., 1600, Elsevier Ltd (2013):
  • [9] Open Source Hardware Design and Hardware Reverse Engineering: A Security Analysis
    Baehr, Johanna
    Hepp, Alexander
    Brunner, Michaela
    Malenko, Maja
    Sigl, Georg
    Proceedings - 2022 25th Euromicro Conference on Digital System Design, DSD 2022, 2022, : 504 - 512
  • [10] Open Source Hardware Design and Hardware Reverse Engineering: A Security Analysis
    Baehr, Johanna
    Hepp, Alexander
    Brunner, Michaela
    Malenko, Maja
    Sigl, Georg
    2022 25TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2022, : 504 - 512