Title :
Cycle-accurate information assurance by proof-carrying based signal sensitivity tracing
Author :
Yier Jin ; Bo Yang ; Makris, Yiorgos
Author_Institution :
Dept. of Electr. Eng. & Comput. Sci., Univ. of Central Florida, Orlando, FL, USA
Abstract :
We propose a new information assurance model which can dynamically track the information flow in circuit designs and hence protect sensitive data from malicious leakage. Relying on the Coq proof assistant platform, the new model maps register transfer level (RTL) codes written in hardware description languages (HDLs) into structural Coq representatives by assigning all input, output, and internal signal sensitivity levels. The signal sensitivity levels can be dynamically adjusted after each clock cycle based on proposed signal sensitivity transition rules. The development of data secrecy properties and theorem generation functions makes the translation process from security properties to Coq theorems independent of target circuits and, for the first time, makes it possible to construct a property library, facilitating (semi) automation of the proof. The proposed cycle accurate information assurance scheme is successfully demonstrated on cryptographic circuits with various complexities from a small-scale DES encryption core to a state-of-the-art AES encryption design prohibiting the leakage of sensitive information caused by hardware Trojans inserted in RTL codes.
Keywords :
cryptography; hardware description languages; integrated circuit design; AES encryption design; HDL; RTL codes; circuit design; cryptographic circuit; cycle-accurate information assurance; data secrecy property; hardware Trojans; hardware description language; malicious leakage; proof assistant platform; proof-carrying based signal sensitivity tracing; register transfer level; security property; signal sensitivity transition rule; small-scale DES encryption core; structural Coq representative; theorem generation function; Encryption; Hardware; Hardware design languages; Integrated circuit modeling; Sensitivity; Trojan horses;
Conference_Titel :
Hardware-Oriented Security and Trust (HOST), 2013 IEEE International Symposium on
Conference_Location :
Austin, TX
Print_ISBN :
978-1-4799-0559-1
DOI :
10.1109/HST.2013.6581573