A Unified Formal Model for Proving Security and Reliability Properties

被引:2
|
作者
Hu, Wei [1 ]
Wu, Lingjuan [1 ,2 ]
Tai, Yu [1 ]
Tan, Jing [1 ]
Zhang, Jiliang [3 ,4 ]
机构
[1] Northwestern Polytech Univ, Sch Cybersecur, Xian 710072, Peoples R China
[2] Huazhong Agr Univ, Coll Informat, Wuhan 430070, Peoples R China
[3] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Peoples R China
[4] Peng Cheng Lab, Cyberspace Secur Res Ctr, Shenzheng 518055, Peoples R China
基金
中国国家自然科学基金;
关键词
Taint-propagation; X-propagation; formal model; formal verification; design property; INFORMATION-FLOW TRACKING;
D O I
10.1109/ats49688.2020.9301533
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Taint-propagation and X-propagation analyses are important tools for enforcing circuit design properties such as security and reliability. Fundamental to these tools are effective models for accurately measuring the propagation of information and calculating metadata. In this work, we formalize a unified model for reasoning about taint- and X-propagation behaviors and verifying design properties related to these behaviors. Our model are developed from the perspective of information flow and can be described using standard hardware description language (HDL), which allows formal verification of both taint-propagation (i.e., security) and X-propagation (i.e., reliability) related properties using standard electronic design automation (EDA) verification tools. Experimental results show that our formal model can be used to prove both security and reliability properties in order to uncover unintended design flaw, timing channel and intentional malicious undocumented functionality in circuit designs.
引用
收藏
页码:30 / 35
页数:6
相关论文
共 50 条
  • [31] A formal security model for microprocessor hardware
    Lotz, V
    Kessler, V
    Walter, GH
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2000, 26 (08) : 702 - 712
  • [32] A unified firewall model for web security
    Nalepa, Grzegorz J.
    Advances in Intelligent Web Mastering, 2007, 43 : 248 - 253
  • [33] Toward a unified security/safety model
    Stoneburner, Gary
    COMPUTER, 2006, 39 (08) : 96 - 97
  • [34] Towards a unified human reliability model
    Baziuk, P. A.
    Rivera, S.
    Nunez Mc Leod, J.
    ADVANCES IN SAFETY, RELIABILITY AND RISK MANAGEMENT, 2012, : 746 - 753
  • [35] A unified gate oxide reliability model
    Hu, CM
    Lu, Q
    1999 IEEE INTERNATIONAL RELIABILITY PHYSICS SYMPOSIUM PROCEEDINGS - 37TH ANNUAL, 1999, : 47 - 51
  • [36] CrashSafe: a formal model for proving crash-safety of Android applications
    Khan, Wilayat
    Ullah, Habib
    Ahmad, Aakash
    Sultan, Khalid
    Alzahrani, Abdullah J.
    Khan, Sultan Daud
    Alhumaid, Mohammad
    Abdulaziz, Sultan
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2018, 8
  • [37] Exploiting Symmetries When Proving Equivalence Properties for Security Protocols
    Cheval, Vincent
    Kremer, Steve
    Rakotonirina, Itsaka
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 905 - 922
  • [38] PROVING GENERATOR RELIABILITY
    BURRIS, RE
    POWER ENGINEERING, 1972, 76 (01) : 38 - &
  • [39] Security pattern lattice: A formal model to organize security patterns
    Sarmah, Achyanta
    Hazarika, Shyamanta M.
    Sinha, Smriti K.
    DEXA 2008: 19TH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2008, : 292 - 296
  • [40] Formalization in PVS of Balancing Properties Necessary for Proving Security of the Dolev-Yao Cascade Protocol Model
    Rego, Yuri Santos
    Ayala-Rincon, Mauricio
    JOURNAL OF FORMALIZED REASONING, 2013, 6 (01): : 31 - 61