Defining and enforcing hardware security requirements

Security in computing systems to date has focused mostly on software. In this research, we explore the application and enforceability of well-defined security requirements in hardware designs. The principal threats to hardware systems demonstrated in the academic literature to date involve some ty...

Full description

Bibliographic Details
Main Author: Bilzor, Michael B.
Other Authors: Huffmire, Ted
Published: Monterey, California. Naval Postgraduate School 2012
Online Access:http://hdl.handle.net/10945/10741
id ndltd-nps.edu-oai-calhoun.nps.edu-10945-10741
record_format oai_dc
spelling ndltd-nps.edu-oai-calhoun.nps.edu-10945-107412014-11-27T16:09:12Z Defining and enforcing hardware security requirements Bilzor, Michael B. Huffmire, Ted Computer Science Security in computing systems to date has focused mostly on software. In this research, we explore the application and enforceability of well-defined security requirements in hardware designs. The principal threats to hardware systems demonstrated in the academic literature to date involve some type of subversion, often called a Hardware Trojan or malicious inclusion. Detecting these has proved very difficult. We demonstrate a method whereby the dynamic enforcement of a processor's security requirements can be used to detect the presence of some of these malicious inclusions. Although there are theoretical limits on which security properties can be dynamically enforced using the techniques we describe, our research does provide a novel method for expressing and enforcing security requirements at runtime in hardware designs. While the method does not guarantee the detection of all possible malicious inclusions in a given processor, it addresses a large class of inclusions-those detectable as violations of behavioral restrictions in the architectural specification-which provides significant progress against the general case, given a suitably complete set of checkers. 2012-08-22T15:33:27Z 2012-08-22T15:33:27Z 2011-12 http://hdl.handle.net/10945/10741 This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. As such, it is in the public domain, and under the provisions of Title 17, United States Code, Section 105, it may not be copyrighted. Monterey, California. Naval Postgraduate School
collection NDLTD
sources NDLTD
description Security in computing systems to date has focused mostly on software. In this research, we explore the application and enforceability of well-defined security requirements in hardware designs. The principal threats to hardware systems demonstrated in the academic literature to date involve some type of subversion, often called a Hardware Trojan or malicious inclusion. Detecting these has proved very difficult. We demonstrate a method whereby the dynamic enforcement of a processor's security requirements can be used to detect the presence of some of these malicious inclusions. Although there are theoretical limits on which security properties can be dynamically enforced using the techniques we describe, our research does provide a novel method for expressing and enforcing security requirements at runtime in hardware designs. While the method does not guarantee the detection of all possible malicious inclusions in a given processor, it addresses a large class of inclusions-those detectable as violations of behavioral restrictions in the architectural specification-which provides significant progress against the general case, given a suitably complete set of checkers.
author2 Huffmire, Ted
author_facet Huffmire, Ted
Bilzor, Michael B.
author Bilzor, Michael B.
spellingShingle Bilzor, Michael B.
Defining and enforcing hardware security requirements
author_sort Bilzor, Michael B.
title Defining and enforcing hardware security requirements
title_short Defining and enforcing hardware security requirements
title_full Defining and enforcing hardware security requirements
title_fullStr Defining and enforcing hardware security requirements
title_full_unstemmed Defining and enforcing hardware security requirements
title_sort defining and enforcing hardware security requirements
publisher Monterey, California. Naval Postgraduate School
publishDate 2012
url http://hdl.handle.net/10945/10741
work_keys_str_mv AT bilzormichaelb definingandenforcinghardwaresecurityrequirements
_version_ 1716721545670295552