Using Security Invariant to Verify Confidentiality in Hardware Design

被引:1
|
作者
Kong, Shuyu [1 ]
Shen, Yuanqi [1 ]
Zhou, Hai [1 ]
机构
[1] Northwestern Univ, Evanston, IL 60208 USA
关键词
INFORMATION-FLOW;
D O I
10.1145/3060403.3060456
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the increasing complexity of design process, outsourcing, and use of third-party blocks, it becomes harder and harder to prevent Trojan insertion and other malicious design modifications. In this paper, we propose to deploy security invariant as carried proof to prevent and detect Trojans and malicious attacks and to ensure the security of hardware design. Non-interference with down-grading policy is checked for confidentiality. Contrary to existing approaches by type checking, we develop a method to model-check a simple safety property on a composed machine. Down-grading is handled in a better way in model-checking and the effectiveness of our approach is demonstrated on various Verilog benchmarks.
引用
收藏
页码:487 / 490
页数:4
相关论文
共 50 条
  • [41] Using Lava to design and verify recursive and periodic sorters
    Koen Claessen
    Mary Sheeran
    Satnam Singh
    International Journal on Software Tools for Technology Transfer, 2003, 4 (3) : 349 - 358
  • [42] Using term rewriting systems to design and verify processors
    Laboratory for Computer Science, Massachusetts Inst. of Technology, 545 Technology Square, Cambridge, MA 02139, United States
    IEEE Micro, 3 (36-46):
  • [43] VERIFY: AN ALGORITHM TO VERIFY A COMPUTER DESIGN.
    Roth, J.P.
    IBM Technical Disclosure Bulletin, 1973, 15 (08): : 2646 - 2648
  • [44] Using term rewriting systems to design and verify processors
    Arvind
    Shen, XW
    IEEE MICRO, 1999, 19 (03) : 36 - 46
  • [45] Design and verify a natural frequency using ANSYS software
    Kukreja, Nitin
    Singhal, Piyush
    MATERIALS TODAY-PROCEEDINGS, 2021, 45 : 3255 - 3258
  • [46] Using Petri Nets to Verify Design Model: A Survey
    Hijazi, Sherin
    Hudaib, Amjad
    PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), 2017, : 1010 - 1015
  • [47] Using SDL for hardware design
    Glunz, Wolfgang
    Venzl, Gerd
    Proceedings of the SDL Forum, 1991,
  • [48] Statistical RF/Analog Integrated Circuit Design Using Combinatorial Randomness for Hardware Security Applications
    Chen, Ethan
    Chen, Vanessa
    MATHEMATICS, 2020, 8 (05)
  • [49] Ultra-Low-Power Design and Hardware Security Using Emerging Technologies for Internet of Things
    Yuan, Jiann-Shiun
    Lin, Jie
    Alasad, Qutaiba
    Taheri, Shayan
    ELECTRONICS, 2017, 6 (03)
  • [50] Physical layer security using an adaptive modulation scheme for improved confidentiality
    Loganathan, Lavanya Dhamodhar
    Rengaraj, Ramaprabha
    Konganathan, Gunaseelan
    Varatharajan, Vaishnavi
    IET COMMUNICATIONS, 2019, 13 (20) : 3383 - 3390