Evaluating Security Specification Mining for a CISC Architecture

被引:0
|
作者
Deutschbein, Calvin [1 ]
Sturton, Cynthia [1 ]
机构
[1] Univ N Carolina, 201 S Columbia St, Chapel Hill, NC 27599 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/host45689.2020.9300291
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security specification mining is a relatively new line of research that aims to develop a set of security properties for use during the design validation phase of the hardware life-cycle. Prior work in this field has targeted open-source RISC architectures and relies on access to the register transfer level design, developers' repositories, bugtracker databases, and email archives. We develop Astarte, a tool for security specification mining of closed-source, CISC architectures. As with prior work, we target properties written at the instruction set architecture (ISA) level. We use a full-system fast emulator with a lightweight extension to generate trace data, and we partition the space of security properties on security-critical signals in the architecture to manage complexity. We evaluate the approach for the x86-64 ISA. The Astarte framework produces roughly 1300 properties. Our automated approach produces a categorization that aligns with prior manual efforts. We study two known security flaws in shipped x86/x86-64 processor implementations and show that our set of properties could have revealed the flaws. Our analysis provides insight into those properties that are guaranteed by the ISA, those that are required of the operating system, and those that have become de facto properties by virtue of many operating systems assuming the behavior.
引用
收藏
页码:164 / 175
页数:12
相关论文
共 50 条
  • [1] Evaluating SFI for a CISC architecture
    McCamant, Stephen
    Morrisett, Greg
    USENIX ASSOCIATION PROCEEDINGS OF THE 15TH USENIX SECURITY SYMPOSIUM, 2006, : 209 - 224
  • [2] SDL specification of a security architecture for WorldFIP
    Chávez, ML
    Henríquez, FR
    14TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS, AND COMPUTERS, PROCEEDINGS, 2004, : 149 - 154
  • [3] Formal Specification of Software Architecture Security Tactics
    Wyeth, Andrew
    Zhang, Cui
    22ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING & KNOWLEDGE ENGINEERING (SEKE 2010), 2010, : 172 - 175
  • [4] Security Architecture and Specification Framework for Safe and Secure Industrial Automation
    Tverdyshev, Sergey
    Blasum, Holger
    Rudina, Ekaterina
    Kulagin, Dmitry
    Dyakin, Pavel
    Moiseev, Stanislav
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2015, 2016, 9578 : 3 - 14
  • [5] Evaluating Security Algorithms in the Substation Communication Architecture
    Hong, Sugwon
    Shin, Dae-Yong
    Lee, Myongho
    2009 INTERNATIONAL CONFERENCE ON SCALABLE COMPUTING AND COMMUNICATIONS & EIGHTH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING, 2009, : 314 - 318
  • [6] TRON CPUS TAKE OPEN ARCHITECTURE CISC APPROACH
    不详
    MICROPROCESSORS AND MICROSYSTEMS, 1989, 13 (08) : 557 - 558
  • [7] Specification architecture
    Turner, KJ
    Scollo, G
    COMPUTER NETWORKS AND ISDN SYSTEMS, 1997, 29 (04): : 393 - 395
  • [8] On Architecture Specification
    Broy, Manfred
    SOFSEM 2018: THEORY AND PRACTICE OF COMPUTER SCIENCE, 2018, 10706 : 19 - 39
  • [9] A View-based Approach for Service-Oriented Security Architecture Specification
    Dikanski, Aleksander
    Abeck, Sebastian
    PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON INTERNET AND WEB APPLICATIONS AND SERVICES (ICIW 2011), 2011, : 207 - 213
  • [10] Adversarial Specification Mining
    Kang, Hong Jin
    Lo, David
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021, 30 (02)