Proceedings of the International Conference on Computer-Aided Design 2018
DOI: 10.1145/3240765.3240839
|View full text |Cite
|
Sign up to set email alerts
|

Property specific information flow analysis for hardware security verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 30 publications
(16 citation statements)
references
References 21 publications
0
16
0
Order By: Relevance
“…The RTLIFT logic can be analyzed by the available EDA tools, eliminating the need for designing a new type system. A property specific approach for information flow security was proposed to accelerate security verification and restrict potential security violations to quickly pinpoint hardware security vulnerabilities [22] .…”
Section: Related Workmentioning
confidence: 99%
“…The RTLIFT logic can be analyzed by the available EDA tools, eliminating the need for designing a new type system. A property specific approach for information flow security was proposed to accelerate security verification and restrict potential security violations to quickly pinpoint hardware security vulnerabilities [22] .…”
Section: Related Workmentioning
confidence: 99%
“…Table IV shows information flow properties for AES and RSA implementations. These properties are collected from work on gate level information flow tracking [20] and were, to the best of our knowledge, developed manually.…”
Section: Hardware Security Propertiesmentioning
confidence: 99%
“…To evaluate Transys on the AES and RSA designs, we draft 17 assertions for 3 designs to feed as input to Transys (see Table VII). We also collect 14 information-flow security assertions for AES and RSA cores from the IFT Model project [20] (see Table IX). These assertions are drafted for 3 AES and 3 RSA implementations, and cover properties about confidentiality, integrity, isolation and timing channels.…”
Section: A Experiments Setup and Datasetmentioning
confidence: 99%
“…The information flow analysis could not cover all information flows as the design scale increasing. Hu et al (2018) employ specified security properties written by the security expertise to relieve the information flow redundancy. While, it also needs a large amount of verification resource to get a good Trojan coverage, including both verification time, design area overhead and security expertise.…”
Section: Hardware Trojans Detectionmentioning
confidence: 99%
“…Many HTs detection technologies (e.g. information flow analysis (Hu et al 2018), logic testing (Dupuis et al 2018) and formal methods) are too time-consuming to cover the entire state space in complex designs. Security verification resources, are the factor related to the security coverage of verification result, like the verification time, the sophistication of the methods, or the dedicated verification engineers available.…”
Section: Introductionmentioning
confidence: 99%