Isadora: automated information-flow property generation for hardware security verification

被引:0
|
作者
Calvin Deutschbein
Andres Meza
Francesco Restuccia
Ryan Kastner
Cynthia Sturton
机构
[1] Willamette University,
[2] University of North Carolina at Chapel Hill,undefined
[3] University of California,undefined
[4] University of North Carolina at Chapel Hill,undefined
来源
关键词
Information-flow tracking; Specification mining; Hardware security validation;
D O I
暂无
中图分类号
学科分类号
摘要
Isadora is a specification mining tool for creating information-flow properties for hardware. Isadora combines hardware information-flow tracking and specification mining to produce properties that are suitable for the hardware security validation and support a better understanding of the hardware’s security posture. Isadora is fully automated; the user provides only a hardware specification and a testbench—they do not need to supply a threat model or security requirements. Isadora is evaluated on a RISC-V processor, an SoC access control mechanism, and the OpenTitan hardware root of trust. Isadora generates security properties that align with Common Weakness Enumerations (CWEs) and with properties written manually by security experts.
引用
收藏
页码:391 / 407
页数:16
相关论文
共 50 条
  • [1] Isadora: automated information-flow property generation for hardware security verification
    Deutschbein, Calvin
    Meza, Andres
    Restuccia, Francesco
    Kastner, Ryan
    Sturton, Cynthia
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2023, 13 (04) : 391 - 407
  • [2] Property Specific Information Flow Analysis for Hardware Security Verification
    Hu, Wei
    Ardeshiricham, Armaiti
    Gobulukoglu, Mustafa S.
    Wang, Xinmu
    Kastner, Ryan
    [J]. 2018 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD) DIGEST OF TECHNICAL PAPERS, 2018,
  • [3] A Hardware Design Language for Timing-Sensitive Information-Flow Security
    Zhang, Danfeng
    Wang, Yao
    Suh, G. Edward
    Myers, Andrew C.
    [J]. ACM SIGPLAN NOTICES, 2015, 50 (04) : 503 - 516
  • [4] INFORMATION-FLOW IN THE AUTOMATED LABORATORY
    SCHAEFFER, BC
    TOBIN, FL
    [J]. ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 1987, 193 : 2 - COMP
  • [5] Verification-based Test Case Generation for Information-Flow Properties
    Herda, Mihai
    Tyszberowicz, Shmuel
    Muessig, Joachim
    Beckert, Bernhard
    [J]. SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING, 2019, : 2231 - 2238
  • [6] OWL: Compositional Verification of Security Protocols via an Information-Flow Type System
    Gancher, Joshua
    Gibson, Sydney
    Singh, Pratap
    Dharanikota, Samvid
    Parno, Bryan
    [J]. 2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 1130 - 1147
  • [7] End-to-End Verification of Information-Flow Security for C and Assembly Programs
    Costanzo, David
    Shao, Zhong
    Gu, Ronghui
    [J]. ACM SIGPLAN NOTICES, 2016, 51 (06) : 648 - 664
  • [8] Hardware Trojan Detection through Information Flow Security Verification
    Nahiyan, Adib
    Sadi, Mehdi
    Vittal, Rahul
    Contreras, Gustavo
    Forte, Domenic
    Tehranipoor, Mark
    [J]. 2017 IEEE INTERNATIONAL TEST CONFERENCE (ITC), 2017,
  • [9] SECURITY INFORMATION-FLOW IN MULTIDIMENSIONAL ARRAYS
    KRAMER, SM
    SIDHU, DP
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 1983, 32 (12) : 1188 - 1191
  • [10] Information-Flow Security for a Core of Java']JavaScript
    Hedin, Daniel
    Sabelfeld, Andrei
    [J]. 2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 3 - 18