Title :
On the Complexity of Generating Gate Level Information Flow Tracking Logic
Author :
Hu, Wei ; Oberg, Jason ; Irturk, Ali ; Tiwari, Mohit ; Sherwood, Timothy ; Mu, Dejun ; Kastner, Ryan
Author_Institution :
Sch. of Autom., Northwestern Polytech. Univ., Xi´´an, China
fDate :
6/1/2012 12:00:00 AM
Abstract :
Hardware-based side channels are known to expose hard-to-detect security holes enabling attackers to get a foothold into the system to perform malicious activities. Despite this fact, security is rarely accounted for in hardware design flows. As a result, security holes are often only identified after significant damage has been inflicted. Recently, gate level information flow tracking (GLIFT) has been proposed to verify information flow security at the level of Boolean gates. GLIFT is able to detect all logical flows including hardware specific timing channels, which is useful for ensuring properties related to confidentiality and integrity and can even provide real-time guarantees on system behavior. GLIFT can be integrated into the standard hardware design, testing and verification process to eliminate unintended information flows in the target design. However, generating GLIFT logic is a difficult problem due to its inherent complexity and the potential losses in precision. This paper provides a formal basis for deriving GLIFT logic which includes a proof on the NP-completeness of generating precise GLIFT logic and a formal analysis of the complexity and precision of various GLIFT logic generation algorithms. Experimental results using IWLS benchmarks provide a practical understanding of the computational complexity.
Keywords :
computational complexity; data integrity; formal specification; formal verification; logic design; logic gates; logic testing; security of data; Boolean gate; GLIFT logic generation algorithm; NP-completeness; computational complexity; data confidentiality; data integrity; formal analysis; gate level information flow tracking logic; hard-to-detect security hole; hardware design flow; hardware design process; hardware specific timing channel; hardware testing process; hardware verification process; hardware-based side channel; information flow security; malicious activity; Algorithm design and analysis; Complexity theory; Hardware; Logic gates; Monitoring; Security; Timing; Algorithm design and analysis; Boolean functions; computational complexity; gate level information flow tracking; information security;
Journal_Title :
Information Forensics and Security, IEEE Transactions on
DOI :
10.1109/TIFS.2012.2189105