首页> 外文期刊>Computers & Security >Theorem proof based gate level information flow tracking for hardware security verification
【24h】

Theorem proof based gate level information flow tracking for hardware security verification

机译:基于定理证明的门级信息流跟踪,用于硬件安全验证

获取原文
获取原文并翻译 | 示例

摘要

Digital hardware lies in the heart of systems deployed in finance, medical care, basic infrastructure and national defense systems. However, due to the lack of effective security verification tools, hardware designs may contain security vulnerabilities resulting from performance optimizations, side channels, insecure debug ports and hardware Trojans, which provide attackers low level access to critical resources and effective attack surface to compromise a system. To address these security threats, we propose a theorem proof based gate level information flow tracking (GLIFT) method for formal verification of security properties and identifying security vulnerabilities that cause security property violations. Our method integrates a precise information flow tracking (IFT) model with the Coq theorem proof environment, inheriting the accuracy of GLIFT and the scalability of theorem proving based formal verification. We formalize semantic circuits and security theorems for proving security properties in order to detect security violations. The proposed method has been demonstrated on an OpenRISC development interface core and an RSA implementation both from OpenCores as well as several Trojan benchmarks from Trust-HUB. Experimental results show that the proposed method detects insecure debug port, timing channel and hardware Trojans that cause violation of important security properties such as confidentiality, integrity and isolation and also derives the trigger condition of hardware Trojans. (C) 2019 Published by Elsevier Ltd.
机译:数字硬件是部署在金融,医疗,基本基础设施和国防系统中的系统的核心。但是,由于缺乏有效的安全验证工具,硬件设计可能包含由于性能优化,侧通道,不安全的调试端口和硬件特洛伊木马导致的安全漏洞,攻击者无法通过该通道对关键资源和有效攻击面进行低级别访问,从而破坏了系统。为了解决这些安全威胁,我们提出了一种基于定理证明的门级信息流跟踪(GLIFT)方法,用于对安全属性进行形式验证并识别导致违反安全属性的安全漏洞。我们的方法将精确的信息流跟踪(IFT)模型与Coq定理证明环境集成在一起,继承了GLIFT的准确性和基于形式验证的定理证明的可扩展性。我们对语义电路和安全性定理进行形式化以证明安全性属性,以便检测安全性违规。 OpenCores的OpenRISC开发接口核心和RSA实现以及Trust-HUB的多个Trojan基准测试都证明了该方法。实验结果表明,该方法能够检测出不安全的调试端口,定时通道和硬件木马,这些木马会违反重要的安全属性,如机密性,完整性和隔离性,并得出硬件木马的触发条件。 (C)2019由Elsevier Ltd.发布

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号