Theorem proof based gate level information flow tracking for hardware security verification

被引:9
|
作者
Qin, Maoyuan [1 ]
Hu, Wei [1 ]
Wang, Xinmu [1 ]
Mu, Dejun [1 ]
Mao, Baolei [2 ]
机构
[1] Northwestern Polytech Univ, 127 West Youyi Rd, Xian, Shaanxi, Peoples R China
[2] Zhengzhou Univ, 100 Kexue Rd, Zhengzhou, Henan, Peoples R China
关键词
Hardware security; Security vulnerability; Security verification; Gate level information flow tracking; Theorem proof; Formal method; LANGUAGE;
D O I
10.1016/j.cose.2019.05.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital hardware lies in the heart of systems deployed in finance, medical care, basic infrastructure and national defense systems. However, due to the lack of effective security verification tools, hardware designs may contain security vulnerabilities resulting from performance optimizations, side channels, insecure debug ports and hardware Trojans, which provide attackers low level access to critical resources and effective attack surface to compromise a system. To address these security threats, we propose a theorem proof based gate level information flow tracking (GLIFT) method for formal verification of security properties and identifying security vulnerabilities that cause security property violations. Our method integrates a precise information flow tracking (IFT) model with the Coq theorem proof environment, inheriting the accuracy of GLIFT and the scalability of theorem proving based formal verification. We formalize semantic circuits and security theorems for proving security properties in order to detect security violations. The proposed method has been demonstrated on an OpenRISC development interface core and an RSA implementation both from OpenCores as well as several Trojan benchmarks from Trust-HUB. Experimental results show that the proposed method detects insecure debug port, timing channel and hardware Trojans that cause violation of important security properties such as confidentiality, integrity and isolation and also derives the trigger condition of hardware Trojans. (C) 2019 Published by Elsevier Ltd.
引用
收藏
页码:225 / 239
页数:15
相关论文
共 50 条
  • [31] Register Transfer Level Information Flow Tracking for Provably Secure Hardware Design
    Ardeshiricham, Armaiti
    Hu, Wei
    Marxen, Joshua
    Kastner, Ryan
    [J]. PROCEEDINGS OF THE 2017 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2017, : 1691 - 1696
  • [32] From speculation to security: Practical and efficient information flow tracking using speculative hardware
    Chen, Haibo
    Wu, Xi
    Yuan, Liwei
    Zang, Binyu
    Yew, Pen-chung
    Chong, Frederic T.
    [J]. ISCA 2008 PROCEEDINGS: 35TH INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE, 2008, : 401 - +
  • [33] Arbitrary Precision and Complexity Tradeoffs for Gate-Level Information Flow Tracking
    Becker, Andrew
    Hu, Wei
    Tai, Yu
    Brisk, Philip
    Kastner, Ryan
    Ienne, Paolo
    [J]. PROCEEDINGS OF THE 2017 54TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2017,
  • [34] Gate-Level Characterization: Foundations and Hardware Security Applications
    Wei, Sheng
    Meguerdichian, Saro
    Potkonjak, Miodrag
    [J]. PROCEEDINGS OF THE 47TH DESIGN AUTOMATION CONFERENCE, 2010, : 222 - 227
  • [35] A Hardware-based Technique for Efficient Implicit Information Flow Tracking
    Shin, Jangseop
    Zhang, Hongce
    Lee, Jinyong
    Heo, Ingoo
    Chen, Yu-Yuan
    Lee, Ruby
    Paek, Yunheung
    [J]. 2016 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2016,
  • [36] HLIFT: A High-level Information Flow Tracking Method for Detecting Hardware Trojans
    Wang, Chenguang
    Cai, Yici
    Zhou, Qiang
    [J]. 2018 23RD ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC), 2018, : 727 - 732
  • [37] Efficient Method for Timing-based Information Flow Verification in Hardware Designs
    Alatoun, Khitam M.
    Vemuri, Ranga
    [J]. PROCEEDINGS OF THE 32ND GREAT LAKES SYMPOSIUM ON VLSI 2022, GLSVLSI 2022, 2022, : 159 - 163
  • [38] Using Word-Level Information in Formal Hardware Verification
    R. Drechsler
    [J]. Automation and Remote Control, 2004, 65 : 963 - 977
  • [39] Using word-level information in formal hardware verification
    Drechsler, R
    [J]. AUTOMATION AND REMOTE CONTROL, 2004, 65 (06) : 963 - 977
  • [40] Utilizing high-level information for formal hardware verification
    Johannsen, P
    Drechsler, R
    [J]. ADVANCED COMPUTER SYSTEMS, PROCEEDINGS, 2002, 664 : 419 - 431