Defining and enforcing hardware security requirements
Security in computing systems to date has focused mostly on software. In this research, we explore the application and enforceability of well-defined security requirements in hardware designs. The principal threats to hardware systems demonstrated in the academic literature to date involve some ty...
Main Author: | |
---|---|
Other Authors: | |
Published: |
Monterey, California. Naval Postgraduate School
2012
|
Online Access: | http://hdl.handle.net/10945/10741 |
id |
ndltd-nps.edu-oai-calhoun.nps.edu-10945-10741 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-nps.edu-oai-calhoun.nps.edu-10945-107412014-11-27T16:09:12Z Defining and enforcing hardware security requirements Bilzor, Michael B. Huffmire, Ted Computer Science Security in computing systems to date has focused mostly on software. In this research, we explore the application and enforceability of well-defined security requirements in hardware designs. The principal threats to hardware systems demonstrated in the academic literature to date involve some type of subversion, often called a Hardware Trojan or malicious inclusion. Detecting these has proved very difficult. We demonstrate a method whereby the dynamic enforcement of a processor's security requirements can be used to detect the presence of some of these malicious inclusions. Although there are theoretical limits on which security properties can be dynamically enforced using the techniques we describe, our research does provide a novel method for expressing and enforcing security requirements at runtime in hardware designs. While the method does not guarantee the detection of all possible malicious inclusions in a given processor, it addresses a large class of inclusions-those detectable as violations of behavioral restrictions in the architectural specification-which provides significant progress against the general case, given a suitably complete set of checkers. 2012-08-22T15:33:27Z 2012-08-22T15:33:27Z 2011-12 http://hdl.handle.net/10945/10741 This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. As such, it is in the public domain, and under the provisions of Title 17, United States Code, Section 105, it may not be copyrighted. Monterey, California. Naval Postgraduate School |
collection |
NDLTD |
sources |
NDLTD |
description |
Security in computing systems to date has focused mostly on software. In this research, we explore the application and enforceability of well-defined security requirements in hardware designs. The principal threats to hardware systems demonstrated in the academic literature to date involve some type of subversion, often called a Hardware Trojan or malicious inclusion. Detecting these has proved very difficult. We demonstrate a method whereby the dynamic enforcement of a processor's security requirements can be used to detect the presence of some of these malicious inclusions. Although there are theoretical limits on which security properties can be dynamically enforced using the techniques we describe, our research does provide a novel method for expressing and enforcing security requirements at runtime in hardware designs. While the method does not guarantee the detection of all possible malicious inclusions in a given processor, it addresses a large class of inclusions-those detectable as violations of behavioral restrictions in the architectural specification-which provides significant progress against the general case, given a suitably complete set of checkers. |
author2 |
Huffmire, Ted |
author_facet |
Huffmire, Ted Bilzor, Michael B. |
author |
Bilzor, Michael B. |
spellingShingle |
Bilzor, Michael B. Defining and enforcing hardware security requirements |
author_sort |
Bilzor, Michael B. |
title |
Defining and enforcing hardware security requirements |
title_short |
Defining and enforcing hardware security requirements |
title_full |
Defining and enforcing hardware security requirements |
title_fullStr |
Defining and enforcing hardware security requirements |
title_full_unstemmed |
Defining and enforcing hardware security requirements |
title_sort |
defining and enforcing hardware security requirements |
publisher |
Monterey, California. Naval Postgraduate School |
publishDate |
2012 |
url |
http://hdl.handle.net/10945/10741 |
work_keys_str_mv |
AT bilzormichaelb definingandenforcinghardwaresecurityrequirements |
_version_ |
1716721545670295552 |