DocumentCode :
2598032
Title :
Verifying a hardware security architecture
Author :
Guttman, Joshua D. ; Ko, Hai-Ping
Author_Institution :
Mitre Corp., Bedford, MA, USA
fYear :
1990
fDate :
7-9 May 1990
Firstpage :
333
Lastpage :
344
Abstract :
The verification work reported had three goals: (1) to develop a method for specifying components, which may be either software processes or hardware components, in terms of their possible event histories (also called traces); (2) to develop a method of verifying systems built from such components; and (3) to use these techniques to prove security properties about a realistic and substantial design. The approach to specification and verification is described. Although they do not yet have robust enough automated support to aid in the application described, the authors have devoted considerable attention to rigorously defining the logic suited to the method and exploring the type of software support needed. The main part of this study describes the use of the approach to specify and verify the security of the hardware architecture level of a hypothetical secure computing system. As far as the authors know, verification methods already in use are not suited to this sort of problem
Keywords :
computer testing; formal specification; program verification; security of data; event histories; hardware components; hardware security architecture; software processes; specification; traces; verification; Computer architecture; Data structures; Hardware; History; Logic; Permission; Physics computing; Protection; Scanning probe microscopy; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Research in Security and Privacy, 1990. Proceedings., 1990 IEEE Computer Society Symposium on
Conference_Location :
Oakland, CA
Print_ISBN :
0-8186-2060-9
Type :
conf
DOI :
10.1109/RISP.1990.63862
Filename :
63862
Link To Document :
بازگشت