Static Gate-Level Information Flow for Hardware Information Security with Bounded Model Checking

被引:0
|
作者
Zhao, Yiqiang [1 ]
Qu, Gonsen [1 ]
Zhang, Qizhi [1 ]
Li, Yao [1 ]
Li, Zhengyang [1 ]
He, Jiaji [1 ]
机构
[1] Tianjin Univ, Sch Microelect, Tianjin, Peoples R China
基金
国家重点研发计划;
关键词
hardware security; gate-level information flow tracking; bounded model checking; TRACKING;
D O I
10.1109/VTS60656.2024.10538813
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Information flow security is an essential component of hardware security. Ensuring the confidentiality, integrity, and availability of data within hardware systems is critical to protect against unauthorized access, data breaches, tampering, and other security threats. Gate-level information flow technology can trace the flow of signals to detect malicious information flow and security vulnerabilities in the design. In this paper, we introduce a novel framework that combines GLIFT and bounded model checking to enable the static verification of information flow within hardware systems. This combination facilitates designers conducting exhaustive analysis, tracking of information flows and detecting potential security threats in their designs. When the design violates security policies, our framework provides a counterexample that assists designers in identifying malicious information flows in the hardware circuits. To demonstrate the efficiency of our framework, we conducted verification on hardware Trojan benchmarks from the Trust-hub. The results indicate that our verification framework is capable of detecting malicious information flows that exist in the designs.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Gate-Level Information Flow Tracking for Security Lattices
    Hu, Wei
    Mu, Dejun
    Oberg, Jason
    Mao, Baolei
    Tiwari, Mohit
    Sherwood, Timothy
    Kastner, Ryan
    [J]. ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2014, 20 (01) : 1 - 25
  • [2] Detecting Hardware Trojans with Gate-Level Information-Flow Tracking
    Hu, Wei
    Mao, Baolei
    Oberg, Jason
    Kastner, Ryan
    [J]. COMPUTER, 2016, 49 (08) : 44 - 52
  • [3] Software-based Gate-level Information Flow Security for IoT Systems
    Cherupalli, Hari
    Duwe, Henry
    Ye, Weidong
    Kumar, Rakesh
    Sartori, John
    [J]. 50TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO), 2017, : 328 - 340
  • [4] GATE-LEVEL INFORMATION-FLOW TRACKING FOR SECURE ARCHITECTURES
    Tiwari, Mohit
    Li, Xun
    Wassel, Hassan M. G.
    Mazloom, Bita
    Mysore, Shashidhar
    Chong, Frederic T.
    Sherwood, Timothy
    [J]. IEEE MICRO, 2010, 30 (01) : 92 - 100
  • [5] Gate-Level Characterization: Foundations and Hardware Security Applications
    Wei, Sheng
    Meguerdichian, Saro
    Potkonjak, Miodrag
    [J]. PROCEEDINGS OF THE 47TH DESIGN AUTOMATION CONFERENCE, 2010, : 222 - 227
  • [6] Theorem proof based gate level information flow tracking for hardware security verification
    Qin, Maoyuan
    Hu, Wei
    Wang, Xinmu
    Mu, Dejun
    Mao, Baolei
    [J]. COMPUTERS & SECURITY, 2019, 85 : 225 - 239
  • [7] A gate-level model for morphogenetic evolvable hardware
    Lee, J
    Sitte, J
    [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE TECHNOLOGY, PROCEEDINGS, 2004, : 113 - 119
  • [8] Exploiting behavioral information in gate-level ATPG
    Chiusano, S
    Corno, F
    Prinetto, P
    [J]. JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 1999, 14 (1-2): : 141 - 148
  • [9] Arbitrary Precision and Complexity Tradeoffs for Gate-Level Information Flow Tracking
    Becker, Andrew
    Hu, Wei
    Tai, Yu
    Brisk, Philip
    Kastner, Ryan
    Ienne, Paolo
    [J]. PROCEEDINGS OF THE 2017 54TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2017,
  • [10] Tracking Data Flow at Gate-Level through Structural Checking
    Le, Thao
    Di, Jia
    Tehranipoor, Mark
    Forte, Domenic
    Wang, Lei
    [J]. 2016 INTERNATIONAL GREAT LAKES SYMPOSIUM ON VLSI (GLSVLSI), 2016, : 185 - 189