Proceedings of the 8th International Workshop on Hardware and Architectural Support for Security and Privacy 2019
DOI: 10.1145/3337167.3337174
|View full text |Cite
|
Sign up to set email alerts
|

SecChisel Framework for Security Verification of Secure Processor Architectures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…The SecVerilog tool has been extended to support mutable dependent types to solve the implicit downgrading problem [284] and the chisel HDL. SecChisel [285] can be used to create secure architectures, synthesize secure cryptographic accelerators and capture information leaks caused by hardware security flaws, timing channels and HTs through type checking.…”
Section: Hardware Security Tools a Security Verification Toolsmentioning
confidence: 99%
“…The SecVerilog tool has been extended to support mutable dependent types to solve the implicit downgrading problem [284] and the chisel HDL. SecChisel [285] can be used to create secure architectures, synthesize secure cryptographic accelerators and capture information leaks caused by hardware security flaws, timing channels and HTs through type checking.…”
Section: Hardware Security Tools a Security Verification Toolsmentioning
confidence: 99%
“…Formal methods are required in this process. For example, information flow tracking, such as methods in [24,115,116], can be used to analyze the hardware components, where the data of transient execution could flow to. Then, analyze if each of the components could result in a permanent or transient covert channel.…”
Section: Mitigating Covert Channelsmentioning
confidence: 99%
“…Besides, manual analysis and associating the probability to hardware behaviors can lead to incomprehensive conclusions. (4) New hardware description languages (HDL) were introduced to design secure hardware circuits [6,16,36] with formal proof. These solutions are not comprehensive for side-channel analysis: they can only be applied to the partitioning-based caches while failing to evaluate the randomization-based designs with stochastic behaviors.…”
Section: Introductionmentioning
confidence: 99%