Evaluating Security Specification Mining for a CISC Architecture

被引:0
|
作者
Deutschbein, Calvin [1 ]
Sturton, Cynthia [1 ]
机构
[1] Univ N Carolina, 201 S Columbia St, Chapel Hill, NC 27599 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/host45689.2020.9300291
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security specification mining is a relatively new line of research that aims to develop a set of security properties for use during the design validation phase of the hardware life-cycle. Prior work in this field has targeted open-source RISC architectures and relies on access to the register transfer level design, developers' repositories, bugtracker databases, and email archives. We develop Astarte, a tool for security specification mining of closed-source, CISC architectures. As with prior work, we target properties written at the instruction set architecture (ISA) level. We use a full-system fast emulator with a lightweight extension to generate trace data, and we partition the space of security properties on security-critical signals in the architecture to manage complexity. We evaluate the approach for the x86-64 ISA. The Astarte framework produces roughly 1300 properties. Our automated approach produces a categorization that aligns with prior manual efforts. We study two known security flaws in shipped x86/x86-64 processor implementations and show that our set of properties could have revealed the flaws. Our analysis provides insight into those properties that are guaranteed by the ISA, those that are required of the operating system, and those that have become de facto properties by virtue of many operating systems assuming the behavior.
引用
收藏
页码:164 / 175
页数:12
相关论文
共 50 条
  • [41] Scalable Specification Mining for Verification and Diagnosis
    Li, Wenchao
    Forin, Alessandro
    Seshia, Sanjit A.
    PROCEEDINGS OF THE 47TH DESIGN AUTOMATION CONFERENCE, 2010, : 755 - 760
  • [42] Specification Mining over Temporal Data
    Bergami, Giacomo
    Appleby, Samuel
    Morgan, Graham
    COMPUTERS, 2023, 12 (09)
  • [43] Specification Mining in Concurrent and Distributed Systems
    Kumar, Sandeep
    2011 33RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2011, : 1086 - 1089
  • [44] Temporal logic specification mining of programs
    Zhang, Nan
    Yu, Bin
    Tian, Cong
    Duan, Zhenhua
    Yuan, Xiaoshuai
    THEORETICAL COMPUTER SCIENCE, 2021, 857 : 29 - 42
  • [45] Specification Mining with Few False Positives
    Le Goues, Claire
    Weimer, Westley
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, PROCEEDINGS, 2009, 5505 : 292 - 306
  • [46] Symbolic Automata for Static Specification Mining
    Peleg, Hila
    Shoham, Sharon
    Yahav, Eran
    Yang, Hongseok
    STATIC ANALYSIS, SAS 2013, 2013, 7935 : 63 - 83
  • [47] Specification Mining in Concurrent and Distributed Systems
    Kumar, Sandeep
    2011 33RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2011, : 1161 - 1163
  • [48] A Qualitative Analysis on the Specification Mining Techniques
    Priya, Annie Ratna
    Mythily, M.
    2013 IEEE INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN COMPUTING, COMMUNICATION AND NANOTECHNOLOGY (ICE-CCN'13), 2013, : 199 - 202
  • [49] ARTINALI plus plus : Multi-dimensional Specification Mining for Complex Cyber-Physical System Security
    Aliabadi, Maryam Raiyat
    Asl, Mojtaba Vahidi
    Ghavamizadeh, Ramak
    JOURNAL OF SYSTEMS AND SOFTWARE, 2021, 180
  • [50] Dynamic Specification Mining Based on Transformer
    Gao, Ying
    Wang, Meng
    Yu, Bin
    THEORETICAL ASPECTS OF SOFTWARE ENGINEERING, TASE 2022, 2022, 13299 : 220 - 237