2020 IEEE Symposium on Security and Privacy (SP) 2020
DOI: 10.1109/sp40000.2020.00030
|View full text |Cite
|
Sign up to set email alerts
|

Transys: Leveraging Common Security Properties Across Hardware Designs

Abstract: This paper presents Transys, a tool for translating security critical properties written for one hardware design to analogous properties suitable for a second design. Transys works in three passes adjusting the variable names, arithmetic expressions, logical preconditions, and timing constraints of the original property to retain the intended semantics of the property while making it valid for the second design. We evaluate Transys by translating 27 assertions written in a temporal logic and 9 properties writt… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 59 publications
0
7
0
Order By: Relevance
“…While identifying security-critical features in a design is an orthogonal problem-and an ongoing area of research [17,23,35,53,66,67]identifying the nets (wires) that comprise said features is the first step in deploying T-TER. Currently, there exist two techniques for identifying security-critical nets: 1) manual [17,23,35] or 2) semi-autonomous [66,67].…”
Section: Identifying Security-critical Nets To Guardmentioning
confidence: 99%
See 1 more Smart Citation
“…While identifying security-critical features in a design is an orthogonal problem-and an ongoing area of research [17,23,35,53,66,67]identifying the nets (wires) that comprise said features is the first step in deploying T-TER. Currently, there exist two techniques for identifying security-critical nets: 1) manual [17,23,35] or 2) semi-autonomous [66,67].…”
Section: Identifying Security-critical Nets To Guardmentioning
confidence: 99%
“…While identifying security-critical features in a design is an orthogonal problem-and an ongoing area of research [17,23,35,53,66,67]identifying the nets (wires) that comprise said features is the first step in deploying T-TER. Currently, there exist two techniques for identifying security-critical nets: 1) manual [17,23,35] or 2) semi-autonomous [66,67]. In manual identification, a human expert analyzes the design's specification, and the corresponding HDL, and flags nets that implement features critical to the security of software or other hardware that interface to the design [17,23,35].…”
Section: Identifying Security-critical Nets To Guardmentioning
confidence: 99%
“…SCIFinder (Zhang et al, 2017) semi-automatically generates security critical properties by using machine learning to label generated invariants based on similarity to known bugs. Transys (Zhang and Sturton, 2020) is able to automatically generate security properties for a target design by translating known properties from some other design to analogous properties on the original design, but does require some initial set of known security properties.…”
Section: Automatic Hardware Securitymentioning
confidence: 99%
“…Additionally, the labelling system required manual efforts in translating across designs and this manual effort introduced the possibility of human error. Translating across designs is a significant research problem that is addressed directly in other research efforts, particularly Transys (Zhang and Sturton, 2020).…”
Section: Labelling Limitationsmentioning
confidence: 99%
“…European Processor Initiative (EPI), one of the cornerstones of the EuroHPC Joint Undertaking, a new European Union strategic entity focused on pooling the Union's and national resources on HPC to build and deploy the most powerful supercomputers within Europe, is preparing to adopt RISC-V as its core solution for exascale embedded HPC platform [9]. protection [54,56,57,59,61,[69][70][71][72], ISA security extensions [66,67,[73][74][75][76][77][78][79][80][81][82][83][84], cryptographic engines and primitives [78][79][80][81][82][83][85][86][87][88][89][90][91][92][93][94][95][96][97][98], and side-channel prevention [99][100][101]…”
Section: Introductionmentioning
confidence: 99%