4.6 Article

A Multi-Flow Information Flow Tracking Approach for Proving Quantitative Hardware Security Properties

期刊

TSINGHUA SCIENCE AND TECHNOLOGY
卷 26, 期 1, 页码 62-71

出版社

TSINGHUA UNIV PRESS
DOI: 10.26599/TST.2019.9010042

关键词

hardware security; Information Flow Tracking (IFT); multi-flow IFT; security property

资金

  1. National Natural Science Foundation of China [61672433]
  2. Natural Science Foundation of Shaanxi Province [2019JM-244]

向作者/读者索取更多资源

Information Flow Tracking (IFT) is a formal method used to prove security properties, but existing methods are limited in assessing quantitative security properties and measuring the severity of security vulnerabilities. The proposed multi-flow IFT method aims to address these limitations by providing insights into simultaneous information flow behaviors and allowing for proof of quantitative information flow security properties.
Information Flow Tracking (IFT) is an established formal method for proving security properties related to confidentiality, integrity, and isolation. It has seen promise in identifying security vulnerabilities resulting from design flaws, timing channels, and hardware Trojans for secure hardware design. However, existing IFT methods tend to take a qualitative approach and only enforce binary security properties, requiring strict non-interference for the properties to hold while real systems usually allow a small amount of information flows to enable desirable interactions. Consequently, existing methods are inadequate for reasoning about quantitative security properties or measuring the security of a design in order to assess the severity of a security vulnerability. In this work, we propose two multi-flow solutions-multiple verifications for replicating existing IFT model and multi-flow IFT method. The proposed multi-flow IFT method provides more insight into simultaneous information flow behaviors and allows for proof of quantitative information flow security properties, such as diffusion, randomization, and boundaries on the amount of simultaneous information flows. Experimental results show that our method can be used to prove a new type of information flow security property with verification performance benefits.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据