2014
DOI: 10.1109/tcad.2014.2331332
|View full text |Cite
|
Sign up to set email alerts
|

Leveraging Gate-Level Properties to Identify Hardware Timing Channels

Abstract: Abstract-Modern embedded computing systems such as medical devices, airplanes, and automobiles continue to dominate some of the most critical aspects of our lives. In such systems, the movement of information throughout a device must be tightly controlled to prevent violations of privacy or integrity. Unfortunately, bounding the flow of information can often present a significant challenge, as information can flow through channels that are difficult to detect, such as timing channels. As has been demonstrated … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
16
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 40 publications
(16 citation statements)
references
References 32 publications
(51 reference statements)
0
16
0
Order By: Relevance
“…This demands a priori knowledge about possible covert channels. In order to capture and remove timing-based side channels in the design the gate-level netlist can be instrumented with IFT capabilities [15]. Such a gate-level IFT method is meant to be applied to selected modules such as a crypto-core or a bus controller.…”
Section: Related Workmentioning
confidence: 99%
“…This demands a priori knowledge about possible covert channels. In order to capture and remove timing-based side channels in the design the gate-level netlist can be instrumented with IFT capabilities [15]. Such a gate-level IFT method is meant to be applied to selected modules such as a crypto-core or a bus controller.…”
Section: Related Workmentioning
confidence: 99%
“…As CC-Hunter is based on detecting contention, it is not directly applicable to detecting the covert channels through branch predictors proposed here, as these channels are not created based on contention. Another fundamental approach that builds the system from the ground up to detect the presence of side channels [Domnitser et al 2012], covert channels, and other unintended information flows is gate-level information flow tracking (GLIFT) [Tiwari et al 2009;Oberg et al 2014]. Although shown to be effective, GLIFT requires significant rearchitecting and redesign of the entire system.…”
Section: Related Workmentioning
confidence: 99%
“…By employing a multilevel security lattice, it allows finer classification of data objects and a better understanding of the leakage process. We refer the interested reader to other works that provide more detail on GLIFT for detecting timing channels [Oberg et al 2013a;2014], which is out of the scope of this work.…”
Section: Static Testing/verification Analysismentioning
confidence: 99%
“…Oberg has shown how GLIFT can be used to identify and eliminate timing channels in shared buses architectures such as I2C, USB, and Wishbone [Oberg et al , 2013a. Further, a practical testing framework is constructed to prove strict isolation between IP blocks with different trust basis in SoC (System-on-Chip) systems [Oberg et al 2014]. Again, GLIFT is used to identify and eliminate harmful flows of information, including those through hard-to-detect timing channels.…”
mentioning
confidence: 99%