首页|寄存器传输级硬件设计信息流建模与安全验证

寄存器传输级硬件设计信息流建模与安全验证

扫码查看
近年来,已有大量研究证明信息流分析能够有效地对设计安全属性与安全行为进行建模.然而,现有的门级抽象层次的信息流分析方法往往受制于算力和验证效力等因素难以应对大规模设计,而RTL抽象层次的信息流分析方法需借助类型系统等形式化语言对硬件设计进行重新描述.因此,提出了一种寄存器传输级硬件设计信息流建模与安全验证方法.该方法在寄存器传输级功能模型的基础上构建附加安全属性的信息流跟踪逻辑模型,从信息流角度建模设计安全行为和安全属性,并利用EDA测试验证工具,以无干扰为策略捕捉违反安全策略的有害信息流,检测硬件设计安全漏洞.以Trust-Hub硬件木马测试集为测试对象的实验结果表明:所提方法能够有效检测设计内潜藏的硬件木马.
Register transfer level hardware design information flow modeling and security verification method
Information flow analysis can effectively model the security behavior and security properties of hardware design.However,the existing gate level information flow analysis methods cannot deal with large-scale designs due to computing power and verification effectiveness,and the register transfer level(RTL)information flow analysis methods require formal languages to rewrite hardware designs.This paper proposes a RTL hardware design informa-tion flow modeling and security verification method.Based on the RTL functional model,this method develops an information flow tracking logical model to model security behavior and security properties of RTL hardware designs from the perspective of information flow.This method can be integrated into EDA flows and uses EDA testing and verification tools to capture security property violations and detect security vulnerabilities based on non-interference security policy.The results on experiments with Trust-Hub hardware Trojan benchmarks show that the proposed method can effectively detect hardware Trojans.

hardware designinformation flow security modelinformation flow security verificationsecurity vulner-ability detection

秦茂源、侯佳滢、李家乐、唐时博、邰瑜

展开 >

西安工业大学计算机科学与工程学院,陕西西安 710021

西北工业大学网络空间安全学院,陕西西安 710072

硬件安全 信息流安全模型 信息流安全验证 安全漏洞检测

国家自然科学基金国家自然科学基金西安市碑林区科技计划陕西省科技计划

U23B204162074131GX21362022JM-379

2024

西北工业大学学报
西北工业大学

西北工业大学学报

CSTPCD北大核心
影响因子:0.496
ISSN:1000-2758
年,卷(期):2024.42(3)