FVCARE:Formal Verification of Security Primitives in Resilient Embedded SoCs

04/22/2023
by   Avani Dave, et al.
0

With the increased utilization, the small embedded and IoT devices have become an attractive target for sophisticated attacks that can exploit the devices security critical information and data in malevolent activities. Secure boot and Remote Attestation (RA) techniques verifies the integrity of the devices software state at boot-time and runtime. Correct implementation and formal verification of these security primitives provide strong security guarantees and enhance user confidence. The formal verification of these security primitives is considered challenging, as it involves complex hardware software interactions, semantics gaps and requires bit-precise reasoning. To address these challenges, this paper presents FVCARE an end to end system co-verification framework. It also defines the security properties for resilient small embedded systems. FVCARE divides the end to end system co verification problem into two modules: 1) verifying the (bit precise) initial system settings, registers, and access control policies by hardware verification techniques, and 2) verifying the system specification, security properties, and functional correctness using source-level software abstraction of the hardware. The evaluation of proposed techniques on SRACARE based systems demonstrates its efficacy in security co verification.

READ FULL TEXT

page 1

page 10

research
11/01/2018

Formally Verified Hardware/Software Co-Design for Remote Attestation

In this work, we take the first step towards formal verification of RA b...
research
11/03/2022

Verifying RISC-V Physical Memory Protection

We formally verify an open-source hardware implementation of physical me...
research
09/01/2023

Security Verification of Low-Trust Architectures

Low-trust architectures work on, from the viewpoint of software, always-...
research
05/05/2023

RARES: Runtime Attack Resilient Embedded System Design Using Verified Proof-of-Execution

Modern society is getting accustomed to the Internet of Things (IoT) and...
research
08/20/2023

Towards a Formally Verified Security Monitor for VM-based Confidential Computing

Confidential computing is a key technology for isolating high-assurance ...
research
11/16/2021

Exploring Usable Security to Improve the Impact of Formal Verification: A Research Agenda

As software becomes more complex and assumes an even greater role in our...
research
07/31/2023

Towards Formal Verification of a TPM Software Stack

The Trusted Platform Module (TPM) is a cryptoprocessor designed to prote...

Please sign up or login with your details

Forgot password? Click here to reset