1. Verification of a Practical Hardware Security Architecture Through Static Information Flow Analysis
- Author
-
Rui Xu, Danfeng Zhang, Andrew Ferraiuolo, G. Edward Suh, and Andrew C. Myers
- Subjects
medicine.medical_specialty ,Hardware security module ,Computer science ,Real-time computing ,Computer security compromised by hardware failure ,02 engineering and technology ,Software ,medicine ,0202 electrical engineering, electronic engineering, information engineering ,Hardware compatibility list ,Information flow (information theory) ,Programmer ,computer.programming_language ,General Environmental Science ,Hardware architecture ,business.industry ,Hardware description language ,020207 software engineering ,General Medicine ,Computer Graphics and Computer-Aided Design ,020202 computer hardware & architecture ,Embedded system ,General Earth and Planetary Sciences ,business ,computer - Abstract
Hardware-based mechanisms for software isolation are becoming increasingly popular, but implementing these mechanisms correctly has proved difficult, undermining the root of security. This work introduces an effective way to formally verify important properties of such hardware security mechanisms. In our approach, hardware is developed using a lightweight security-typed hardware description language (HDL) that performs static information flow analysis. We show the practicality of our approach by implementing and verifying a simplified but realistic multi-core prototype of the ARM TrustZone architecture. To make the security-typed HDL expressive enough to verify a realistic processor, we develop new type system features. Our experiments suggest that information flow analysis is efficient, and programmer effort is modest. We also show that information flow constraints are an effective way to detect hardware vulnerabilities, including several found in commercial processors.
- Published
- 2017
- Full Text
- View/download PDF