SoftFlow: Automated HW-SW Confidentiality Verification for Embedded Processors

08/04/2023
by   Lennart M. Reimann, et al.
0

Despite its ever-increasing impact, security is not considered as a design objective in commercial electronic design automation (EDA) tools. This results in vulnerabilities being overlooked during the software-hardware design process. Specifically, vulnerabilities that allow leakage of sensitive data might stay unnoticed by standard testing, as the leakage itself might not result in evident functional changes. Therefore, EDA tools are needed to elaborate the confidentiality of sensitive data during the design process. However, state-of-the-art implementations either solely consider the hardware or restrict the expressiveness of the security properties that must be proven. Consequently, more proficient tools are required to assist in the software and hardware design. To address this issue, we propose SoftFlow, an EDA tool that allows determining whether a given software exploits existing leakage paths in hardware. Based on our analysis, the leakage paths can be retained if proven not to be exploited by software. This is desirable if the removal significantly impacts the design's performance or functionality, or if the path cannot be removed as the chip is already manufactured. We demonstrate the feasibility of SoftFlow by identifying vulnerabilities in OpenSSL cryptographic C programs, and redesigning them to avoid leakage of cryptographic keys in a RISC-V architecture.

READ FULL TEXT
research
09/06/2021

QFlow: Quantitative Information Flow for Security-Aware Hardware Design in Verilog

The enormous amount of code required to design modern hardware implement...
research
11/30/2022

Quantitative Information Flow for Hardware: Advancing the Attack Landscape

Security still remains an afterthought in modern Electronic Design Autom...
research
01/18/2020

System-on-Chip Security Assertions

Assertions are widely used for functional validation as well as coverage...
research
04/12/2023

Automated Information Flow Analysis for Integrated Computing-in-Memory Modules

Novel non-volatile memory (NVM) technologies offer high-speed and high-d...
research
06/17/2021

Intentional Forgetting

Many damaging cybersecurity attacks are enabled when an attacker can acc...
research
07/22/2022

NISTT: A Non-Intrusive SystemC-TLM 2.0 Tracing Tool

The increasing complexity of systems-on-a-chip requires the continuous d...
research
09/01/2023

Security Verification of Low-Trust Architectures

Low-trust architectures work on, from the viewpoint of software, always-...

Please sign up or login with your details

Forgot password? Click here to reset