2016 17th International Workshop on Microprocessor and SOC Test and Verification (MTV) 2016
DOI: 10.1109/mtv.2016.12
|View full text |Cite
|
Sign up to set email alerts
|

Towards Property Driven Hardware Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 26 publications
(15 citation statements)
references
References 22 publications
0
15
0
Order By: Relevance
“…Quantitative security properties allow more accurate measurement of hardware design security, e.g., assessing the severity of a vulnerability or evaluating the effectiveness of a security protection mechanism. Typical examples of such quantitative properties include randomness of the output of a cryptographic function [20], leakage of side and covert channels [39] and strength of a security mitigation [40]. These security properties are usually measured using statistical and information theoretic security metrics [41].…”
Section: F Quantitative Security Propertiesmentioning
confidence: 99%
See 3 more Smart Citations
“…Quantitative security properties allow more accurate measurement of hardware design security, e.g., assessing the severity of a vulnerability or evaluating the effectiveness of a security protection mechanism. Typical examples of such quantitative properties include randomness of the output of a cryptographic function [20], leakage of side and covert channels [39] and strength of a security mitigation [40]. These security properties are usually measured using statistical and information theoretic security metrics [41].…”
Section: F Quantitative Security Propertiesmentioning
confidence: 99%
“…This points to the need for any mitigation to come with proof that they are correct. Property driven hardware security [20] advocates for such an approach where the threat model is formally specified as properties, e.g., SystemVerilog Assertion (SVA) assertions, information flow properties, etc., and hardware security verification tools provide assurance that the designs adhere to the specified properties.…”
Section: B System and Architectural Protection Techniquesmentioning
confidence: 99%
See 2 more Smart Citations
“…Property driven hardware security. There has lately been a call for "property driven hardware security" [28], [29], [30] that advocates building security specifications into the hardware design workflow, automating the process of doing so, and developing quantifiable measures of security. We see Transys as a contribution in response to this call.…”
Section: Related Workmentioning
confidence: 99%