Mining Secure Behavior of Hardware Designs

08/20/2021
by   Calvin Deutschbein, et al.
0

Specification mining offers a solution by automating security specification for hardware. Specification miners use a form of machine learning to specify behaviors of a system by studying a system in execution. However, specification mining was first developed for use with software. Complex hardware designs offer unique challenges for this technique. Further, specification miners traditionally capture functional specifications without a notion of security, and may not use the specification logics necessary to describe some security requirements. This work demonstrates specification mining for hardware security. On CISC architectures such as x86, I demonstrate that a miner partitioning the design state space along control signals discovers a specification that includes manually defined properties and, if followed, would secure CPU designs against Memory Sinkhole and SYSRET privilege escalation. For temporal properties, I demonstrate that a miner using security specific linear temporal logic (LTL) templates for specification detection may find properties that, if followed, would secure designs against historical documented security vulnerabilities and against potential future attacks targeting system initialization. For information–flow hyperproperties, I demonstrate that a miner may use Information Flow Tracking (IFT) to develop output properties containing designer specified information–flow security properties as well as properties that demonstrate a design does not contain certain Common Weakness Enumerations (CWEs).

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/09/2022

Deep Bidirectional Transformers for SoC Flow Specification Mining

High-quality system-level message flow specifications can lead to compre...
research
08/16/2021

OACAL: Finding Module-consistent Specifications to Secure Systems from Weakened User Obligations

Users interacting with a system through UI are typically obliged to perf...
research
01/18/2021

Efficient Monitoring of Hyperproperties using Prefix Trees

Hyperproperties, such as non-interference and observational determinism,...
research
08/27/2019

SNITCH: Dynamic Dependent Information Flow Analysis for Independent Java Bytecode

Software testing is the most commonly used technique in the industry to ...
research
05/22/2020

Mining Message Flows from System-on-Chip Execution Traces

Comprehensive and well-defined specifications are necessary to perform r...
research
05/05/2021

Flavours of Sequential Information Flow

Information-flow policies prescribe which information is available to a ...
research
06/22/2022

On Specifying for Trustworthiness

As autonomous systems are becoming part of our daily lives, ensuring the...

Please sign up or login with your details

Forgot password? Click here to reset