2018 51st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO) 2018
DOI: 10.1109/micro.2018.00071
|View full text |Cite
|
Sign up to set email alerts
|

End-to-End Automated Exploit Generation for Validating the Security of Processor Designs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 41 publications
(23 citation statements)
references
References 30 publications
0
23
0
Order By: Relevance
“…Zhang et al [41] present Coppelia, a tool to automatically generate software exploits for hardware designs. However, the processor designs they consider, OR1200, PULPino, and Mor1kx, do not feature speculative execution.…”
Section: Related Workmentioning
confidence: 99%
“…Zhang et al [41] present Coppelia, a tool to automatically generate software exploits for hardware designs. However, the processor designs they consider, OR1200, PULPino, and Mor1kx, do not feature speculative execution.…”
Section: Related Workmentioning
confidence: 99%
“…Properties expressed in a restricted temporal logic are added, in the form of assertion statements, to the RTL design and simulation-based testing or static analysis is used to find violations. Researchers have recently begun to adapt ABV for the security validation of a hardware design [10], [5], [7], [6].…”
Section: A Restricted Temporal Logicmentioning
confidence: 99%
“…We present Transys, a tool that takes in a set of security critical properties developed for one hardware design and translates those properties to a form that is appropriate for a second design. The insight that led to this work is the recent research into security specification development and security validation tools, which uses properties developed for one processor design in order to evaluate the proposed methodology on a second design [5], [6], [7]. The properties must be translated manually, and this process is mentioned only in passing, but it suggests that the properties crafted for one processor design can be made suitable for a second design.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In subsequent work, one of the authors has developed a semiautomated method for learning new security properties using information gleaned from known exploitable bugs 8 ; and demonstrated that properties developed for one RISC processor may be suitable for use, after some translation, on a second RISC processor, even across architectures. 9 However, the development of security-critical properties for use with FinalFilter or any property-based verification method is still in its infancy and more research is needed.…”
Section: Using Finalfiltermentioning
confidence: 99%