Using Security Invariant To Verify Confidentiality in Hardware Design
Title | Using Security Invariant To Verify Confidentiality in Hardware Design |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Kong, Shuyu, Shen, Yuanqi, Zhou, Hai |
Conference Name | Proceedings of the on Great Lakes Symposium on VLSI 2017 |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-4972-7 |
Keywords | composability, confidentiality, downgrading, hardware security, model checking, noninterference, pubcrawl, safety property |
Abstract | Due to the increasing complexity of design process, outsourcing, and use of third-party blocks, it becomes harder and harder to prevent Trojan insertion and other malicious design modifications. In this paper, we propose to deploy security invariant as carried proof to prevent and detect Trojans and malicious attacks and to ensure the security of hardware design. Non-interference with down-grading policy is checked for confidentiality. Contrary to existing approaches by type checking, we develop a method to model-check a simple safety property on a composed machine. Down-grading is handled in a better way in model-checking and the effectiveness of our approach is demonstrated on various Verilog benchmarks. |
URL | https://dl.acm.org/citation.cfm?doid=3060403.3060456 |
DOI | 10.1145/3060403.3060456 |
Citation Key | kong_using_2017 |