Skip to main content

2018 | OriginalPaper | Buchkapitel

A Simplifying Logic Approach for Gate Level Information Flow Tracking

verfasst von : Yu Tai, Wei Hu, Dejun Mu, Baolei Mao, Lantian Guo, Maoyuan Qin

Erschienen in: Communications and Networking

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the increase of design scale and complexity, security vulnerabilities residing in hardware designs become hard to detect. Existing functional testing and verification methods cannot guarantee test and verification coverage in design phase. Fortunately, gate level information flow tracking (GLIFT) has been proposed to enforce bit-tight information flow security from the gate level to detect security vulnerabilities and prevent information leakage effectively. However, there is a significant limitation that the inherent high complexity of GLIFT logic causes significant overheads in static verification and physical implementation. In order to address the limitation, we propose a simplified GLIFT method that incorporates more detailed optimization logic routes to reduce its complexity and allow don’t care to simplify original GLIFT logic. Experimental results have demonstrated that the simplified GLIFT method can reduce the design overhand in several gates by sacrificing a fraction of GLIFT precision.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Bell, D.E., LaPadula, L.J.: Secure computer systems: mathematical foundations. Technical report, DTIC Document (1973) Bell, D.E., LaPadula, L.J.: Secure computer systems: mathematical foundations. Technical report, DTIC Document (1973)
4.
Zurück zum Zitat Dalton, M., Kannan, H., Kozyrakis. C.: Raksha: a flexible information flow architecture for software security. In: ACM SIGARCH Computer Architecture News, vol. 35, pp. 482–493. ACM (2007) Dalton, M., Kannan, H., Kozyrakis. C.: Raksha: a flexible information flow architecture for software security. In: ACM SIGARCH Computer Architecture News, vol. 35, pp. 482–493. ACM (2007)
6.
Zurück zum Zitat Denning, D.E.: Cryptography and Data Security. Addison-Wesley Longman Publishing Co., Inc., Boston (1982)MATH Denning, D.E.: Cryptography and Data Security. Addison-Wesley Longman Publishing Co., Inc., Boston (1982)MATH
7.
Zurück zum Zitat Goguen, J.A., Meseguer, J.: Security policies and security models. In: IEEE Symposium on Security and privacy, vol. 11, p. 77 (1982) Goguen, J.A., Meseguer, J.: Security policies and security models. In: IEEE Symposium on Security and privacy, vol. 11, p. 77 (1982)
8.
Zurück zum Zitat Hu, W., Becker, A., Ardeshiricham, A., Tai, Y., Ienne, P., Mu, D., Kastner, R.: Imprecise security: quality and complexity tradeoffs for hardware information flow tracking. In: Proceedings of the 35th International Conference on Computer-Aided Design, p. 95. ACM (2016) Hu, W., Becker, A., Ardeshiricham, A., Tai, Y., Ienne, P., Mu, D., Kastner, R.: Imprecise security: quality and complexity tradeoffs for hardware information flow tracking. In: Proceedings of the 35th International Conference on Computer-Aided Design, p. 95. ACM (2016)
9.
Zurück zum Zitat Hu, W., Mao, B., Oberg, J., Kastner, R.: Detecting hardware trojans with gate-level information-flow tracking. Computer 49(8), 44–52 (2016)CrossRef Hu, W., Mao, B., Oberg, J., Kastner, R.: Detecting hardware trojans with gate-level information-flow tracking. Computer 49(8), 44–52 (2016)CrossRef
11.
Zurück zum Zitat Krohn, M., Yip, A., Brodsky, M., Cliffer, N., Kaashoek, M.F., Kohler, E., Morris, R.: Information flow control for standard OS abstractions. In: ACM SIGOPS Operating Systems Review, vol. 41, pp. 321–334. ACM (2007) Krohn, M., Yip, A., Brodsky, M., Cliffer, N., Kaashoek, M.F., Kohler, E., Morris, R.: Information flow control for standard OS abstractions. In: ACM SIGOPS Operating Systems Review, vol. 41, pp. 321–334. ACM (2007)
12.
Zurück zum Zitat Mu, D., Hu, W., Mao, B., Ma, B.: A bottom-up approach to verifiable embedded system information flow security. IET Inf. Secur. 8(1), 12–17 (2014)CrossRef Mu, D., Hu, W., Mao, B., Ma, B.: A bottom-up approach to verifiable embedded system information flow security. IET Inf. Secur. 8(1), 12–17 (2014)CrossRef
13.
Zurück zum Zitat Pottier, F., Simonet, V.: Information flow inference for ML. ACM Trans. Program. Lang. Syst. (TOPLAS) 25(1), 117–158 (2003)CrossRef Pottier, F., Simonet, V.: Information flow inference for ML. ACM Trans. Program. Lang. Syst. (TOPLAS) 25(1), 117–158 (2003)CrossRef
14.
Zurück zum Zitat Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE J. Sel. Areas Commun. 21(1), 5–19 (2003)CrossRef Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE J. Sel. Areas Commun. 21(1), 5–19 (2003)CrossRef
15.
Zurück zum Zitat Suh, G.E., Lee, J.W., Zhang, D., Devadas, S.L Secure program execution via dynamic information flow tracking. In: ACM Sigplan Notices, vol. 39, pp. 85–96. ACM (2004) Suh, G.E., Lee, J.W., Zhang, D., Devadas, S.L Secure program execution via dynamic information flow tracking. In: ACM Sigplan Notices, vol. 39, pp. 85–96. ACM (2004)
16.
Zurück zum Zitat Tiwari, M., Wassel, H.M., Mazloom, B., Mysore, S., Chong, F.T., Sherwood, T.: Complete information flow tracking from the gates up. In: ACM Sigplan Notices, vol. 44, pp. 109–120. ACM (2009) Tiwari, M., Wassel, H.M., Mazloom, B., Mysore, S., Chong, F.T., Sherwood, T.: Complete information flow tracking from the gates up. In: ACM Sigplan Notices, vol. 44, pp. 109–120. ACM (2009)
17.
Zurück zum Zitat Vandebogart, S., Efstathopoulos, P., Kohler, E., Krohn, M., Frey, C., Ziegler, D., Kaashoek, F., Morris, R., Mazières, D.: Labels and event processes in the asbestos operating system. ACM Trans. Comput. Syst. (TOCS) 25(4), 11 (2007)CrossRef Vandebogart, S., Efstathopoulos, P., Kohler, E., Krohn, M., Frey, C., Ziegler, D., Kaashoek, F., Morris, R., Mazières, D.: Labels and event processes in the asbestos operating system. ACM Trans. Comput. Syst. (TOCS) 25(4), 11 (2007)CrossRef
18.
Zurück zum Zitat Venkataramani, G., Doudalis, I., Solihin, Y., Prvulovic, M.: Flexitaint: a programmable accelerator for dynamic taint propagation. In: 2008 IEEE 14th International Symposium on High Performance Computer Architecture, pp. 173–184. IEEE (2008) Venkataramani, G., Doudalis, I., Solihin, Y., Prvulovic, M.: Flexitaint: a programmable accelerator for dynamic taint propagation. In: 2008 IEEE 14th International Symposium on High Performance Computer Architecture, pp. 173–184. IEEE (2008)
19.
Zurück zum Zitat Volpano, D., Irvine, C., Smith, G.: A sound type system for secure flow analysis. J. Comput. Secur. 4(2–3), 167–187 (1996)CrossRef Volpano, D., Irvine, C., Smith, G.: A sound type system for secure flow analysis. J. Comput. Secur. 4(2–3), 167–187 (1996)CrossRef
20.
Zurück zum Zitat Zhang, D., Wang, Y., Suh, G.E., Myers, A.C.: A hardware design language for timing-sensitive information-flow security. In: The Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2015, pp. 503–516, New York, NY, USA (2015) Zhang, D., Wang, Y., Suh, G.E., Myers, A.C.: A hardware design language for timing-sensitive information-flow security. In: The Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2015, pp. 503–516, New York, NY, USA (2015)
Metadaten
Titel
A Simplifying Logic Approach for Gate Level Information Flow Tracking
verfasst von
Yu Tai
Wei Hu
Dejun Mu
Baolei Mao
Lantian Guo
Maoyuan Qin
Copyright-Jahr
2018
Verlag
Springer International Publishing
DOI
https://doi.org/10.1007/978-3-319-78139-6_31