Early SoC Security Validation by VP-based Static Information Flow Analysis

被引:0
|
作者
Hassan, Muhammad [1 ,2 ]
Herdt, Vladimir [2 ]
Le, Hoang M. [2 ]
Grosse, Daniel [1 ,2 ]
Drechsler, Rolf [1 ,2 ]
机构
[1] DFKI GmbH, Cyber Phys Syst, D-28359 Bremen, Germany
[2] Univ Bremen, Inst Comp Sci, D-28359 Bremen, Germany
来源
2017 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD) | 2017年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security is one of the most burning issues in embedded system design nowadays. The majority of strategies to secure embedded systems are being implemented in software. However, a potential hardware backdoor that allows unprivileged software access to confidential data will render even the perfectly secure software useless. As the underlying SoC cannot be patched after deployment, it is very critical to detect and correct SoC hardware security issues in the design phase. To prevent costly fixes in later stages, security validation should start as early as possible. In this paper, we propose a novel approach to SoC security validation at the system level using Virtual Prototypes (VP). At the heart of the approach is a scalable static information flow analysis that can detect potential security breaches such as data leakage and untrusted access; confidentiality and integrity issues, respectively. We demonstrate the applicability of the approach on real-world VPs.
引用
收藏
页码:400 / 407
页数:8
相关论文
共 50 条
  • [21] EXERT: EXhaustive IntEgRiTy Analysis for Information Flow Security
    Wu, Jiaming
    Fowze, Farhaan
    Forte, Domenic
    Proceedings of the 2022 Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2022, 2022,
  • [22] EXERT: EXhaustive IntEgRiTy Analysis for Information Flow Security
    Wu, Jiaming
    Fowze, Farhaan
    Forte, Domenic
    2022 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2022,
  • [23] Analysis and Evaluation of PUF-Based SoC Designs for Security Applications
    Stanciu, Alexandra
    Cirstea, Marcian N.
    Moldoveanu, Florin Dumitru
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2016, 63 (09) : 5699 - 5708
  • [24] Static Security Analysis based on Weighted Vulnerability Index
    Pang, Chengzong
    Kezunovic, Mladen
    2011 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING, 2011,
  • [25] Language-based information-flow security
    Sabelfeld, A
    Myers, AC
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2003, 21 (01) : 5 - 19
  • [26] Cryptographic core design security verification and vulnerability detection based on information flow analysis
    Ma Y.
    Tang S.
    Tan J.
    Li X.
    Hu W.
    Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University, 2022, 40 (01): : 76 - 83
  • [27] Dynamic vs. Static Flow-Sensitive Security Analysis
    Russo, Alejandro
    Sabelfeld, Andrei
    2010 23RD IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2010, : 186 - 199
  • [28] Flow analysis of distribution system used for reliability and static security evaluation
    Lu, Zongxiang
    Guo, Yongji
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2000, 40 (03): : 32 - 35
  • [29] A static analysis for quantifying information flow in a simple imperative language
    Clark, David
    Hunt, Sebastian
    Malacaria, Pasquale
    JOURNAL OF COMPUTER SECURITY, 2007, 15 (03) : 321 - 371
  • [30] Static analysis for efficient hybrid information-flow control
    Moore, Scott
    Chong, Stephen
    2011 IEEE 24TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2011, : 146 - 160