A Unified Formal Model for Proving Security and Reliability Properties

被引:2
|
作者
Hu, Wei [1 ]
Wu, Lingjuan [1 ,2 ]
Tai, Yu [1 ]
Tan, Jing [1 ]
Zhang, Jiliang [3 ,4 ]
机构
[1] Northwestern Polytech Univ, Sch Cybersecur, Xian 710072, Peoples R China
[2] Huazhong Agr Univ, Coll Informat, Wuhan 430070, Peoples R China
[3] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Peoples R China
[4] Peng Cheng Lab, Cyberspace Secur Res Ctr, Shenzheng 518055, Peoples R China
基金
中国国家自然科学基金;
关键词
Taint-propagation; X-propagation; formal model; formal verification; design property; INFORMATION-FLOW TRACKING;
D O I
10.1109/ats49688.2020.9301533
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Taint-propagation and X-propagation analyses are important tools for enforcing circuit design properties such as security and reliability. Fundamental to these tools are effective models for accurately measuring the propagation of information and calculating metadata. In this work, we formalize a unified model for reasoning about taint- and X-propagation behaviors and verifying design properties related to these behaviors. Our model are developed from the perspective of information flow and can be described using standard hardware description language (HDL), which allows formal verification of both taint-propagation (i.e., security) and X-propagation (i.e., reliability) related properties using standard electronic design automation (EDA) verification tools. Experimental results show that our formal model can be used to prove both security and reliability properties in order to uncover unintended design flaw, timing channel and intentional malicious undocumented functionality in circuit designs.
引用
收藏
页码:30 / 35
页数:6
相关论文
共 50 条
  • [21] Reliability - Security model
    Schneidewind, Nonrnan F.
    ICECCS 2006: 11TH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS, PROCEEDINGS, 2006, : 279 - 287
  • [22] Invariant Evaluation through Introspection for Proving Security Properties
    Baiardi, Fabrizio
    Maggiari, Dario
    Sgandurra, Daniele
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (02): : 124 - 132
  • [23] Formal Analysis of Language-Based Android Security Using Theorem Proving Approach
    Khan, Wilayat
    Kamran, Muhammad
    Ahmad, Aakash
    Khan, Farrukh Aslam
    Derhab, Abdelouahid
    IEEE ACCESS, 2019, 7 : 16550 - 16560
  • [24] A Unified and Formal Programming Model for Deltas and Traits
    Damiani, Ferruccio
    Hahnle, Reiner
    Kamburjan, Eduard
    Lienhardt, Michael
    FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, FASE 2017, 2017, 10202 : 424 - 441
  • [25] A unified ordering for termination proving
    Yamada, Akihisa
    Kusakari, Keiichirou
    Sakabe, Toshiki
    SCIENCE OF COMPUTER PROGRAMMING, 2015, 111 : 110 - 134
  • [26] A formal security model for microprocessor hardware
    Lotz, V
    Kessler, V
    Walter, G
    FM'99-FORMAL METHODS, 1999, 1708 : 718 - 737
  • [27] A formal model for the grid security infrastructure
    Li, BY
    Rao, RN
    Li, ML
    You, JY
    WEB INFORMATION SYSTEMS - WISE 2004, PROCEEDINGS, 2004, 3306 : 706 - 717
  • [28] A Formal Multilevel Database Security Model
    Wang Baohua
    Ma Xinqiang
    Li Danning
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 815 - +
  • [29] Towards a Formal IoT Security Model
    Martin, Tania
    Geneiatakis, Dimitrios
    Kounelis, Ioannis
    Kerckhof, Stephanie
    Fovino, Igor Nai
    SYMMETRY-BASEL, 2020, 12 (08): : 1 - 16
  • [30] A formal model of Healthcare Security Policy
    Cohen, B
    TOWARD AN ELECTRONIC PATIENT RECORD '97 - CONFERENCE AND EXPOSITION, PROCEEDINGS, VOLS 1-3, 1997, : B181 - B196