A Unified Formal Model for Proving Security and Reliability Properties

被引:2
|
作者
Hu, Wei [1 ]
Wu, Lingjuan [1 ,2 ]
Tai, Yu [1 ]
Tan, Jing [1 ]
Zhang, Jiliang [3 ,4 ]
机构
[1] Northwestern Polytech Univ, Sch Cybersecur, Xian 710072, Peoples R China
[2] Huazhong Agr Univ, Coll Informat, Wuhan 430070, Peoples R China
[3] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Peoples R China
[4] Peng Cheng Lab, Cyberspace Secur Res Ctr, Shenzheng 518055, Peoples R China
基金
中国国家自然科学基金;
关键词
Taint-propagation; X-propagation; formal model; formal verification; design property; INFORMATION-FLOW TRACKING;
D O I
10.1109/ats49688.2020.9301533
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Taint-propagation and X-propagation analyses are important tools for enforcing circuit design properties such as security and reliability. Fundamental to these tools are effective models for accurately measuring the propagation of information and calculating metadata. In this work, we formalize a unified model for reasoning about taint- and X-propagation behaviors and verifying design properties related to these behaviors. Our model are developed from the perspective of information flow and can be described using standard hardware description language (HDL), which allows formal verification of both taint-propagation (i.e., security) and X-propagation (i.e., reliability) related properties using standard electronic design automation (EDA) verification tools. Experimental results show that our formal model can be used to prove both security and reliability properties in order to uncover unintended design flaw, timing channel and intentional malicious undocumented functionality in circuit designs.
引用
收藏
页码:30 / 35
页数:6
相关论文
共 50 条
  • [1] Formal Reliability Analysis Using Theorem Proving
    Hasan, Osman
    Tahar, Sofiene
    Abbasi, Naeem
    IEEE TRANSACTIONS ON COMPUTERS, 2010, 59 (05) : 579 - 592
  • [2] A formal model for proving hardware timing properties and identifying timing channels
    Qin, Maoyuan
    Wang, Xinmu
    Mao, Baolei
    Mu, Dejun
    Hu, Wei
    INTEGRATION-THE VLSI JOURNAL, 2020, 72 : 123 - 133
  • [3] Partial model checking and theorem proving for ensuring security properties
    Martinelli, F
    11TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP - PROCEEDINGS, 1998, : 44 - 52
  • [4] A Short Introduction to Two Approaches in Formal Verification of Security Protocols: Model Checking and Theorem Proving
    Pourpouneh, Mohsen
    Ramezanian, Rasoul
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 8 (01): : 3 - 24
  • [5] Formal reliability analysis of combinational circuits using theorem proving
    Hasan, Osman
    Patel, Jigar
    Tahar, Sofiene
    JOURNAL OF APPLIED LOGIC, 2011, 9 (01) : 41 - 60
  • [6] Reliability, Validity, and Strength of a Unified Model for Information Security Policy Compliance
    Koohang, Alex
    Nord, Jeretta Horn
    Sandoval, Zoroayka, V
    Paliszkiewicz, Joanna
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2021, 61 (02) : 99 - 107
  • [7] Proving properties of security protocols by induction
    Paulson, LC
    10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 70 - 83
  • [8] Formal Verification of Control Systems' Properties with Theorem Proving
    Araiza-Illan, Dejanira
    Eder, Kerstin
    Richards, Arthur
    2014 UKACC INTERNATIONAL CONFERENCE ON CONTROL (CONTROL), 2014, : 244 - 249
  • [9] Logic of Events for Proving Security Properties of Protocols
    Xiao, Meihua
    Bickford, Mark
    WISM: 2009 INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, : 519 - +
  • [10] A unified formal model of ISA and FSMD
    Zhu, JW
    Gajski, DD
    PROCEEDINGS OF THE SEVENTH INTERNATIONAL WORKSHOP ON HARDWARE/SOFTWARE CODESIGN (CODES'99), 1999, : 121 - 125