Early SoC Security Validation by VP-based Static Information Flow Analysis

被引:0
|
作者
Hassan, Muhammad [1 ,2 ]
Herdt, Vladimir [2 ]
Le, Hoang M. [2 ]
Grosse, Daniel [1 ,2 ]
Drechsler, Rolf [1 ,2 ]
机构
[1] DFKI GmbH, Cyber Phys Syst, D-28359 Bremen, Germany
[2] Univ Bremen, Inst Comp Sci, D-28359 Bremen, Germany
来源
2017 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD) | 2017年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security is one of the most burning issues in embedded system design nowadays. The majority of strategies to secure embedded systems are being implemented in software. However, a potential hardware backdoor that allows unprivileged software access to confidential data will render even the perfectly secure software useless. As the underlying SoC cannot be patched after deployment, it is very critical to detect and correct SoC hardware security issues in the design phase. To prevent costly fixes in later stages, security validation should start as early as possible. In this paper, we propose a novel approach to SoC security validation at the system level using Virtual Prototypes (VP). At the heart of the approach is a scalable static information flow analysis that can detect potential security breaches such as data leakage and untrusted access; confidentiality and integrity issues, respectively. We demonstrate the applicability of the approach on real-world VPs.
引用
收藏
页码:400 / 407
页数:8
相关论文
共 50 条
  • [31] Hypercollecting Semantics and Its Application to Static Analysis of Information Flow
    Assaf, Mounir
    Naumann, David A.
    Signoles, Julien
    Totel, Eric
    Tronel, Frederic
    ACM SIGPLAN NOTICES, 2017, 52 (01) : 874 - 887
  • [32] Hypercollecting semantics and its application to static analysis of information flow
    Assaf M.
    Naumann D.A.
    Signoles J.
    Totel E.
    Tronel F.
    1600, Association for Computing Machinery (52): : 874 - 887
  • [33] Using security robustness analysis for early-stage validation of functional security requirements
    Mohamed El-Attar
    Hezam Akram Abdul-Ghani
    Requirements Engineering, 2016, 21 : 1 - 27
  • [34] Using security robustness analysis for early-stage validation of functional security requirements
    El-Attar, Mohamed
    Abdul-Ghani, Hezam Akram
    REQUIREMENTS ENGINEERING, 2016, 21 (01) : 1 - 27
  • [35] Early SoCs Information Flow Policies Validation Using SystemC-Based Virtual Prototypes at the ESL
    Goli, Mehran
    Drechsler, Rolf
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2024, 23 (05)
  • [36] Instruction-level security analysis for information flow in stack-based assembly languages
    De Francesco, Nicoletta
    Martini, Luca
    INFORMATION AND COMPUTATION, 2007, 205 (09) : 1334 - 1370
  • [37] Detecting Security Leaks in Hybrid Systems with Information Flow Analysis
    Luan Viet Nguyen
    Mohan, Gautam
    Weimer, James
    Sokolsky, Oleg
    Lee, Insup
    Alur, Rajeev
    17TH ACM-IEEE INTERNATIONAL CONFERENCE ON FORMAL METHODS AND MODELS FOR SYSTEM DESIGN (MEMOCODE), 2019,
  • [38] Property Specific Information Flow Analysis for Hardware Security Verification
    Hu, Wei
    Ardeshiricham, Armaiti
    Gobulukoglu, Mustafa S.
    Wang, Xinmu
    Kastner, Ryan
    2018 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD) DIGEST OF TECHNICAL PAPERS, 2018,
  • [39] Security Path Verification Through Joint Information Flow Analysis
    Hu, Wei
    Wang, Xinmu
    Mu, Dejun
    2018 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS (APCCAS 2018), 2018, : 415 - 418
  • [40] Analysis of information flow security in cyber-physical systems
    Akella, Ravi
    Tang, Han
    McMillin, Bruce M.
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2010, 3 (3-4) : 157 - 173