Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Data Secrecy Protection Through Information Flow Tracking in Proof-Carrying Hardware IP—Part I: Framework Fundamentals

Published: 01 October 2017 Publication History

Abstract

Proof-carrying hardware intellectual property (PCHIP) is a previously proposed framework for ensuring trustworthiness of third-party hardware IP through the development of formal proofs for security properties designed to prevent introduction of malicious behavior. Based on this framework, we introduce new approaches for assuring that the secrecy of internal information in a hardware design is not compromised by design flaws or malicious hardware Trojans. Specifically, we devise two PCHIP-based information flow tracking approaches, which enhance the formal PCHIP framework with secrecy tags and/or sensitivity levels in order to provide mechanisms for proving that sensitive information does not reach undesired sites. To assist in the development of data secrecy properties, we also introduce the concept of theorem generation functions, which enable generation of security theorems independent of the target circuit, thereby paving the way for proof automation. In addition, we enhance the PCHIP framework with a hierarchy-preserving methodology and we show its utility in preventing malicious data modification, which may indirectly result in sensitive information leakage, such as by modifying the secret key in a cryptographic core. This enhanced PCHIP framework also enables development of hybrid module libraries, which contain hardware description language code along with proofs of lemmas for these modules. These module libraries can then be used for hierarchically proving security properties in higher level designs, thereby reducing the proof development burden in the general PCHIP framework. Efforts toward automation of the proposed methodologies, as well as evaluation of their effectiveness in identifying design flaws or hardware Trojans in various cryptographic hardware designs are presented in part II of this paper series.

References

[1]
A. C. Myers and B. Liskov, “A decentralized model for information flow control,” in Proc. ACM Symp. Oper. Syst. Principles (SOSP), 1997, pp. 129–142.
[2]
A. Sabelfeld and A. C. Myers, “Language-based information-flow security,” IEEE J. Sel. Areas Commun., vol. 21, no. 1, pp. 5–19, Jan. 2003.
[3]
L. C. Lam and T. Chiueh, “A general dynamic information flow tracking framework for security applications,” in Proc. Annu. Comput. Secur. Appl. Conf. (ACSAC), 2006, pp. 463–472.
[4]
G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas, “Secure program execution via dynamic information flow tracking,” in Proc. Int. Conf. Archit. Support Program. Lang. Oper. Syst. (ASPLOS), 2004, pp. 85–96.
[5]
S. Chen, J. Xu, N. Nakka, Z. Kalbarczyk, and R. Iyer, “Defeating memory corruption attacks via pointer taintedness detection,” in Proc. Int. Conf. Dependable Syst. Netw. (DSN), 2005, pp. 378–387.
[6]
W. Shi, J. Fryman, G. Gu, H.-H. Lee, Y. Zhang, and J. Yang, “Infoshield: A security architecture for protecting information usage in memory,” in Proc. Int. Symp. High-Perform. Comput. Archit. (HPCA), 2006, pp. 222–231.
[7]
N. Vachharajaniet al., “RIFLE: An architectural framework for user-centric information-flow security,” in Proc. Int. Symp. Microarchitecture (MICRO), 2004, pp. 243–254.
[8]
Y.-Y. Chen, P. A. Jamkhedkar, and R. B. Lee, “A software-hardware architecture for self-protecting data,” in Proc. ACM Conf. Comput. Commun. Secur. (CCS), 2012, pp. 14–27.
[9]
Y. Jin and D. Oliveira, “Extended abstract: Trustworthy SoC architecture with on-demand security policies and HW-SW cooperation,” in Proc. Heterogeneous Archit. Workloads Workshop SoCs, 2014, pp. 1–2.
[10]
M. Tiwari, H. M. Wassel, B. Mazloom, S. Mysore, F. T. Chong, and T. Sherwood, “Complete information flow tracking from the gates up,” in Proc. Int. Conf. Archit. Support Program. Lang. Oper. Syst. (ASPLOS), 2009, pp. 109–120.
[11]
K. Xiao, D. Forte, Y. Jin, R. Karri, S. Bhunia, and M. Tehranipoor, “Hardware Trojans: Lessons learned after one decade of research,” ACM Trans. Design Autom. Electron. Syst. (TODAES), vol. 22, no. 1, pp. 6:1–6:23, 2016.
[12]
S. Bhunia, M. S. Hsiao, M. Banga, and S. Narasimhan, “Hardware Trojan attacks: Threat analysis and countermeasures,” Proc. IEEE, vol. 102, no. 8, pp. 1229–1247, Aug. 2014.
[13]
Y. Jin, N. Kupp, and Y. Makris, “Experiences in hardware Trojan design and implementation,” in Proc. IEEE Int. Workshop Hardw.-Oriented Secur. Trust (HOST), Sep. 2009, pp. 50–57.
[14]
L. Lin, M. Kasper, T. Guneysu, C. Paar, and W. Burleson, “Trojan side-channels: Lightweight hardware Trojans through side-channel engineering,” in Proc. Int. Workshop Cryptograph. Hardw. Embedded Syst. (CHES), 2009, pp. 382–395.
[15]
E. Love, Y. Jin, and Y. Makris, “Proof-carrying hardware intellectual property: A pathway to trusted module acquisition,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 25–40, Feb. 2012.
[16]
A. Waksman, M. Suozzo, and S. Sethumadhavan, “FANCI: Identification of stealthy malicious logic using Boolean functional analysis,” in Proc. ACM Conf. Comput. Commun. Secur. (CCS), Sep. 2013, pp. 697–708.
[17]
J. Zhang, F. Yuan, L. Wei, Z. Sun, and Q. Xu, “Veritrust: Verification for hardware trust,” in Proc. ACM Design Autom. Conf. (DAC), 2013, pp. 61:1–61:8.
[18]
J. Zhang, F. Yuan, and Q. Xu, “Detrust: Defeating hardware trust verification with stealthy implicitly-triggered hardware Trojans,” in Proc. ACM Conf. Comput. Commun. Secur. (CCS), 2014, pp. 153–166.
[19]
H. Salmani, “COTD: Reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist,” IEEE Trans. Inf. Forensics Security, vol. 12, no. 2, pp. 338–350, Feb. 2017.
[20]
S. Sahaet al., “Improved test pattern generation for hardware trojan detection using genetic algorithm and Boolean satisfiability,” in Proc. Int. Workshop Cryptograph. Hardw. Embedded Syst. (CHES), 2015, pp. 577–596.
[21]
R. S. Chakraborty, F. Wolff, S. Paul, C. Papachristou, and S. Bhunia, “Mero: A statistical approach for hardware trojan detection,” in Proc. Int. Workshop Cryptograph. Hardw. Embedded Syst. (CHES), 2009, pp. 396–410.
[22]
X. Liet al., “Caisson: A hardware description language for secure information flow,” in Proc. ACM Conf. Program. Lang. Design Implement. (PLDI), 2011, pp. 109–120.
[23]
X. Liet al., “Sapper: A language for hardware-level security policy enforcement,” in Proc. Int. Conf. Archit. Support Program. Lang. Oper. Syst. (ASPLOS), 2014, pp. 97–112.
[24]
D. Zhang, Y. Wang, G. E. Suh, and A. C. Myers, “A hardware design language for timing-sensitive information-flow security,” in Proc. Int. Conf. Archit. Support Program. Lang. Oper. Syst. (ASPLOS), 2015, pp. 503–516.
[25]
W. Hu, B. Mao, J. Oberg, and R. Kastner, “Detecting hardware trojans with gate-level information-flow tracking,” Comput., vol. 49, no. 8, pp. 44–52, 2016.
[26]
Y. Jin and Y. Makris, “Proof carrying-based information flow tracking for data secrecy protection and hardware trust,” in Proc. IEEE VLSI Test Symp. (VTS), 2012, pp. 252–257.
[27]
Y. Jin, B. Yang, and Y. Makris, “Cycle-accurate information assurance by proof-carrying based signal sensitivity tracing,” in Proc. IEEE Int. Symp. Hardw.-Oriented Secur. Trust (HOST), Apr. 2013, pp. 99–106.
[28]
Y. Jin and Y. Makris, “A proof-carrying based framework for trusted microprocessor IP,” in Proc. IEEE/ACM Int. Conf. Comput.-Aided Design (ICCAD), May 2013, pp. 824–829.
[29]
INRIA. The COQ Proof Assistant, accessed on Jun. 1, 2016. [Online]. Available: http://coq.inria.fr/
[30]
T. Braibant and A. Chlipala, “Formal verification of hardware synthesis,” in Proc. Comput. Aided Verification, 2013, pp. 213–228.
[31]
W. Huet al., “Gate-level information flow tracking for security lattices,” ACM Trans. Design Autom. Electron. Syst., vol. 20, no. 1, p. 2, 2014.

Cited By

View all
  • (2024)Early SoCs Information Flow Policies Validation Using SystemC-Based Virtual Prototypes at the ESLACM Transactions on Embedded Computing Systems10.1145/354478023:5(1-20)Online publication date: 14-Aug-2024
  • (2023)Leaking Wireless ICs via Hardware Trojan-Infected SynchronizationIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.321850720:5(3845-3859)Online publication date: 31-Aug-2023
  • (2021)Hardware Information Flow TrackingACM Computing Surveys10.1145/344786754:4(1-39)Online publication date: 3-May-2021
  • Show More Cited By

Index Terms

  1. Data Secrecy Protection Through Information Flow Tracking in Proof-Carrying Hardware IP—Part I: Framework Fundamentals
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image IEEE Transactions on Information Forensics and Security
          IEEE Transactions on Information Forensics and Security  Volume 12, Issue 10
          Oct. 2017
          237 pages

          Publisher

          IEEE Press

          Publication History

          Published: 01 October 2017

          Qualifiers

          • Research-article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 12 Feb 2025

          Other Metrics

          Citations

          Cited By

          View all
          • (2024)Early SoCs Information Flow Policies Validation Using SystemC-Based Virtual Prototypes at the ESLACM Transactions on Embedded Computing Systems10.1145/354478023:5(1-20)Online publication date: 14-Aug-2024
          • (2023)Leaking Wireless ICs via Hardware Trojan-Infected SynchronizationIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.321850720:5(3845-3859)Online publication date: 31-Aug-2023
          • (2021)Hardware Information Flow TrackingACM Computing Surveys10.1145/344786754:4(1-39)Online publication date: 3-May-2021
          • (2018)ASAX: Automatic security assertion extraction for detecting Hardware Trojans2018 23rd Asia and South Pacific Design Automation Conference (ASP-DAC)10.1109/ASPDAC.2018.8297287(84-89)Online publication date: 22-Jan-2018

          View Options

          View options

          Figures

          Tables

          Media

          Share

          Share

          Share this Publication link

          Share on social media