Evaluating Security Specification Mining for a CISC Architecture

被引:0
|
作者
Deutschbein, Calvin [1 ]
Sturton, Cynthia [1 ]
机构
[1] Univ N Carolina, 201 S Columbia St, Chapel Hill, NC 27599 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/host45689.2020.9300291
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security specification mining is a relatively new line of research that aims to develop a set of security properties for use during the design validation phase of the hardware life-cycle. Prior work in this field has targeted open-source RISC architectures and relies on access to the register transfer level design, developers' repositories, bugtracker databases, and email archives. We develop Astarte, a tool for security specification mining of closed-source, CISC architectures. As with prior work, we target properties written at the instruction set architecture (ISA) level. We use a full-system fast emulator with a lightweight extension to generate trace data, and we partition the space of security properties on security-critical signals in the architecture to manage complexity. We evaluate the approach for the x86-64 ISA. The Astarte framework produces roughly 1300 properties. Our automated approach produces a categorization that aligns with prior manual efforts. We study two known security flaws in shipped x86/x86-64 processor implementations and show that our set of properties could have revealed the flaws. Our analysis provides insight into those properties that are guaranteed by the ISA, those that are required of the operating system, and those that have become de facto properties by virtue of many operating systems assuming the behavior.
引用
收藏
页码:164 / 175
页数:12
相关论文
共 50 条
  • [21] Specification mining for asynchronous controllers
    de San Pedro, Javier
    Bourgeat, Thomas
    Cortadella, Jordi
    2016 22ND IEEE INTERNATIONAL SYMPOSIUM ON ASYNCHRONOUS CIRCUITS AND SYSTEMS, 2016, : 107 - 114
  • [22] Deep Specification Mining with Attention
    Cao, Zhi
    Zhang, Nan
    COMPUTING AND COMBINATORICS (COCOON 2020), 2020, 12273 : 186 - 197
  • [23] Security and management policy specification
    Sloman, M
    Lupu, E
    IEEE NETWORK, 2002, 16 (02): : 10 - 19
  • [24] THE SPECIFICATION AND MODELING OF COMPUTER SECURITY
    MCLEAN, J
    COMPUTER, 1990, 23 (01) : 9 - 16
  • [25] Security policy specification in logic
    Barker, S
    IC-AI'2000: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 1-III, 2000, : 1299 - 1304
  • [26] MIRO - VISUAL SPECIFICATION OF SECURITY
    HEYDON, A
    MAIMONE, MW
    TYGAR, JD
    WING, JM
    ZAREMSKI, AM
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1990, 16 (10) : 1185 - 1197
  • [27] Action systems for security specification
    Sinclair, J
    9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 102 - 113
  • [28] Security Specification at Process Level
    Chollet, Stephanie
    Lalanda, Philippe
    2008 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, VOL 1, 2008, : 165 - 172
  • [29] Specification of security constraint in UML
    Fernández-Medina, E
    Piattini, M
    Serrano, MA
    35TH ANNUAL 2001 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2001, : 163 - 171
  • [30] A goal question metric approach for evaluating security in a service oriented architecture context
    Kassou, Meryem
    Kjiri, Laila
    International Journal of Computer Science Issues, 2012, 9 (4 4-1): : 238 - 249