Quantitative Information Flow for Hardware: Advancing the Attack Landscape

11/30/2022
by   Lennart M. Reimann, et al.
0

Security still remains an afterthought in modern Electronic Design Automation (EDA) tools, which solely focus on enhancing performance and reducing the chip size. Typically, the security analysis is conducted by hand, leading to vulnerabilities in the design remaining unnoticed. Security-aware EDA tools assist the designer in the identification and removal of security threats while keeping performance and area in mind. State-of-the-art approaches utilize information flow analysis to spot unintended information leakages in design structures. However, the classification of such threats is binary, resulting in negligible leakages being listed as well. A novel quantitative analysis allows the application of a metric to determine a numeric value for a leakage. Nonetheless, current approximations to quantify the leakage are still prone to overlooking leakages. The mathematical model 2D-QModel introduced in this work aims to overcome this shortcoming. Additionally, as previous work only includes a limited threat model, multiple threat models can be applied using the provided approach. Open-source benchmarks are used to show the capabilities of 2D-QModel to identify hardware Trojans in the design while ignoring insignificant leakages.

READ FULL TEXT
research
08/04/2023

SoftFlow: Automated HW-SW Confidentiality Verification for Embedded Processors

Despite its ever-increasing impact, security is not considered as a desi...
research
09/06/2021

QFlow: Quantitative Information Flow for Security-Aware Hardware Design in Verilog

The enormous amount of code required to design modern hardware implement...
research
02/03/2022

Design and Development of Automated Threat Hunting in Industrial Control Systems

Traditional industrial systems, e.g., power plants, water treatment plan...
research
04/17/2021

SoK: Design Tools for Side-Channel-Aware Implementions

Side-channel attacks that leak sensitive information through a computing...
research
06/07/2021

QFuzz: Quantitative Fuzzing for Side Channels

Side channels pose a significant threat to the confidentiality of softwa...
research
06/04/2020

Data-Flow-Based Extension of the System-Theoretic Process Analysis for Security (STPA-Sec)

Security analysis is an essential activity in security engineering to id...
research
04/12/2023

Automated Information Flow Analysis for Integrated Computing-in-Memory Modules

Novel non-volatile memory (NVM) technologies offer high-speed and high-d...

Please sign up or login with your details

Forgot password? Click here to reset