DocumentCode :
2959428
Title :
Toward automatic proof generation for information flow policies in third-party hardware IP
Author :
Bidmeshki, Mohammad-Mahdi ; Makris, Yiorgos
Author_Institution :
Dept. of Electr. Eng., Univ. of Texas at Dallas, Dallas, TX, USA
fYear :
2015
fDate :
5-7 May 2015
Firstpage :
163
Lastpage :
168
Abstract :
The proof carrying hardware intellectual property (PCHIP) framework ensures trustworthiness by developing proofs for security properties designed to prevent introduction of malicious behaviors via third-party hardware IP. However, converting a design to a formal representation and developing proofs for the desired security properties is a cumbersome task for IP developers and requires extra knowledge of formal reasoning methods, proof development and proof checking. While security properties are generally specific to each design, information flow policies are a set of policies which ensure that no secret information is leaked through untrusted channels, and are mainly applicable to the designs which manipulate secret and sensitive data. In this work, we introduce the VeriCoq-IFT framework which aims to (i) automate the process of converting designs from HDL to the Coq formal language, (ii) generate security property theorems ensuring information flow policies, (iii) construct proofs for such theorems, and (iv) check their validity for the design, with minimal user intervention. We take advantage of Coq proof automation facilities in proving the generated theorems for enforcing these policies and we demonstrate the applicability of our automated framework on two DES encryption circuits. By providing essential information, the trustworthiness of these circuits in terms of information flow policies is verified automatically. Any alteration of the circuit description against information flow policies causes proofs to fail. Our methodology is the first but essential step in the adoption of PCHIP as a valuable method to authenticate the trustworthiness of third party hardware IP with minimal extra effort.
Keywords :
formal languages; industrial property; theorem proving; trusted computing; Coq formal language; DES encryption circuits; HDL; PCHIP framework; VeriCoq-IFT framework; automatic proof generation; formal reasoning methods; information flow policies; malicious behaviors; proof carrying hardware intellectual property framework; proof checking; proof development; third-party hardware; Hardware; Hardware design languages; IP networks; Sensitivity; Trojan horses; Wires;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Hardware Oriented Security and Trust (HOST), 2015 IEEE International Symposium on
Conference_Location :
Washington, DC
Type :
conf
DOI :
10.1109/HST.2015.7140256
Filename :
7140256
Link To Document :
بازگشت