Evaluating Security Specification Mining for a CISC Architecture

被引:0
|
作者
Deutschbein, Calvin [1 ]
Sturton, Cynthia [1 ]
机构
[1] Univ N Carolina, 201 S Columbia St, Chapel Hill, NC 27599 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/host45689.2020.9300291
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security specification mining is a relatively new line of research that aims to develop a set of security properties for use during the design validation phase of the hardware life-cycle. Prior work in this field has targeted open-source RISC architectures and relies on access to the register transfer level design, developers' repositories, bugtracker databases, and email archives. We develop Astarte, a tool for security specification mining of closed-source, CISC architectures. As with prior work, we target properties written at the instruction set architecture (ISA) level. We use a full-system fast emulator with a lightweight extension to generate trace data, and we partition the space of security properties on security-critical signals in the architecture to manage complexity. We evaluate the approach for the x86-64 ISA. The Astarte framework produces roughly 1300 properties. Our automated approach produces a categorization that aligns with prior manual efforts. We study two known security flaws in shipped x86/x86-64 processor implementations and show that our set of properties could have revealed the flaws. Our analysis provides insight into those properties that are guaranteed by the ISA, those that are required of the operating system, and those that have become de facto properties by virtue of many operating systems assuming the behavior.
引用
收藏
页码:164 / 175
页数:12
相关论文
共 50 条
  • [31] Compositional specification of software architecture
    NASA Ames Research Cent, Moffett Field, CA, United States
    International Software Architecture Workshop, Proceedings, ISAW, 1998, : 113 - 116
  • [32] A layered software specification architecture
    Snoeck, M
    Poelmans, S
    Dedene, G
    CONCEPTUAL MODELING ER 2000, PROCEEDINGS, 2000, 1920 : 454 - 469
  • [33] A FORMAL SPECIFICATION OF THE PVM ARCHITECTURE
    BORGER, E
    GLASSER, U
    INFORMATION PROCESSING '94, VOL I: TECHNOLOGY AND FOUNDATIONS, 1994, 51 : 402 - 409
  • [34] Formal Specification of Reconfigurable Architecture
    Chang, Zhiming
    Cui, Yonghua
    Han, Xueyan
    He, Junan
    SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING: THEORY AND PRACTICE, VOL 1, 2012, 114 : 481 - 490
  • [35] A novel asynchronous pipeline architecture for CISC type embedded controller, A8051
    Lee, JH
    Lee, WC
    Cho, KR
    2002 45TH MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL II, CONFERENCE PROCEEDINGS, 2002, : 675 - 678
  • [36] Architecture Diagrams: A Graphical Language for Architecture Style Specification
    Mavridou, Anastasia
    Baranov, Eduard
    Bliudze, Simon
    Sifakis, Joseph
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2016, (223): : 83 - 97
  • [37] PPTL specification mining based on LNFG
    Ning, Xinya
    Zhang, Nan
    Duan, Zhenhua
    Tian, Cong
    THEORETICAL COMPUTER SCIENCE, 2022, 937 : 85 - 95
  • [38] Generating test cases for specification mining
    Saarland University - Computer Science, Saarbrücken, Germany
    ISSTA - Proc. Int. Symp. Softw. Test. Anal., (85-95):
  • [39] Finding Related Events for Specification Mining
    Dai, Ziying
    Mao, Xiaoguang
    Chen, Liqian
    Lei, Yan
    Zhang, Yi
    2013 IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW), 2013, : 1 - +
  • [40] SpecTackle - A Specification Mining Experimentation Platform
    Heumueller, Robert
    Nielebock, Sebastian
    Ortmeier, Frank
    2019 45TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2019), 2019, : 178 - 181