2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2015
DOI: 10.1109/hst.2015.7140256
|View full text |Cite
|
Sign up to set email alerts
|

Toward automatic proof generation for information flow policies in third-party hardware IP

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(13 citation statements)
references
References 9 publications
0
13
0
Order By: Relevance
“…There exist several secure languages, enabling designers to model provably secure hardware. Caisson [31], Sapper [30], SecVerilog [7,40], and VeriCoq-IFT [5] are hardware security design languages that allow designers to label and track information low. Caisson [31] and Sapper [30] are both FSM-based languages that have been developed by combining domain-speciic abstractions common to hardware design and type-based techniques used in secure programming languages.…”
Section: Related Workmentioning
confidence: 99%
“…There exist several secure languages, enabling designers to model provably secure hardware. Caisson [31], Sapper [30], SecVerilog [7,40], and VeriCoq-IFT [5] are hardware security design languages that allow designers to label and track information low. Caisson [31] and Sapper [30] are both FSM-based languages that have been developed by combining domain-speciic abstractions common to hardware design and type-based techniques used in secure programming languages.…”
Section: Related Workmentioning
confidence: 99%
“…The PCH-IP and VeriCoq projects provide several tools for verifying IP security and trust [245]- [247]. These tools define rules for converting RTL Verilog design to Coq 1 semantic circuit models.…”
Section: Hardware Security Tools a Security Verification Toolsmentioning
confidence: 99%
“…They use the Coq theorem prover to formally verify confidentiality properties on the Coq circuit models in order to detect malicious design modifications. VeriCoq [245] has recently been extended to the transistor level to verify the security of analog/mix-signal designs and detect analog HTs [281]. However, these projects tend to employ conservative rules to model information flow security behaviors, which can lead to false alarms in security verification.…”
Section: Hardware Security Tools a Security Verification Toolsmentioning
confidence: 99%
“…Hardware Trojans are small-scale circuits designed to perform a malicious operation not intended by the original system [ 18 ]. Attackers can insert them at multiple points in the supply chain, such as the foundry [ 19 ] or a third-party IP provider [ 20 ], as illustrated in Figure 3 . Various techniques have been developed to detect hardware Trojans during testing or at run-time in the field [ 21 ].…”
Section: Related Workmentioning
confidence: 99%