首页> 外文会议>IEEE/ACM International Conference on Computer-Aided Design >Mining mutation testing simulation traces for security and testbench debugging
【24h】

Mining mutation testing simulation traces for security and testbench debugging

机译:挖掘变异测试模拟轨迹以进行安全性和测试台调试

获取原文

摘要

Unspecified design functionality can be modified by Hardware Trojans to leak information. Existing methods capable of detecting these Trojans require that unspecified functionality already be characterized, and suggest a manual ad-hoc process to enumerate “don't care” conditions potentially containing security vulnerabilities. Prior work has shown the potential of mutation testing to uncover testbench holes and highlight unspecified functionality, but requires tedious manual analysis of undetected faults to gain useful insight. This work provides the missing link required to fully automate characterization of unspecified functionality and can formally prove the absence of Trojans. Our approach is to mine simulation traces generated during mutation testing to produce assertions characterizing verification holes or unspecified functionality. These assertions can be fed directly to Trojan detection methods making securing unspecified functionality a completely automated process. Our trace mining technique is able to identify unspecified Wishbone bus functionality in a Trojan-free UART core and verify the functionality is benign, while flagging the same functionality in a Trojan-infected version of the design.
机译:硬件木马可以修改未指定的设计功能,以泄漏信息。能够检测这些特洛伊木马的现有方法要求已对未指定的功能进行了特征描述,并建议采用手动临时过程来枚举可能包含安全漏洞的“无关”条件。先前的工作已经表明了进行突变测试以发现测试台孔并突出未指定功能的潜力,但是需要对未检测到的故障进行繁琐的手动分析才能获得有用的见识。这项工作提供了完全自动化未指定功能的特性所需的缺少链接,并且可以正式证明不存在特洛伊木马。我们的方法是挖掘在变异测试过程中生成的模拟跟踪,以产生表征验证漏洞或未指定功能的断言。这些断言可以直接提供给特洛伊木马检测方法,从而使未指定功能的保护成为完全自动化的过程。我们的跟踪挖掘技术能够在不含Trojan的UART内核中识别未指定的Wishbone总线功能,并验证其功能是否良好,同时在受Trojan感染的设计版本中标记相同的功能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号