2016
DOI: 10.1007/978-3-319-48989-6_30
|View full text |Cite
|
Sign up to set email alerts
|

SpecCert: Specifying and Verifying Hardware-Based Security Enforcement

Abstract: Abstract. Over time, hardware designs have constantly grown in complexity and modern platforms involve multiple interconnected hardware components. During the last decade, several vulnerability disclosures have proven that trust in hardware can be misplaced. In this article, we give a formal definition of Hardware-based Security Enforcement (HSE) mechanisms, a class of security enforcement mechanisms such that a software component relies on the underlying hardware platform to enforce a security policy. We then… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…the isolation mechanism provided by OS kernels or hypervisors leveraging hardware features. Such approaches require formalizing the interactions between software and hardware components [21].…”
Section: B Future Work 1) Functional Verificationmentioning
confidence: 99%
See 1 more Smart Citation
“…the isolation mechanism provided by OS kernels or hypervisors leveraging hardware features. Such approaches require formalizing the interactions between software and hardware components [21].…”
Section: B Future Work 1) Functional Verificationmentioning
confidence: 99%
“…Second, the security properties proved at the ISA level still rely on the correct implementation of this ISA by a microarchitectural model. Some works in formal methods for hardware verification [1], [6], [15], [21] are based on models of the actual hardware. While this makes proofs easier to come up with, this also opens a possibility for discrepancies between the model and the actual hardware, thus giving a false sense of security.…”
Section: Introductionmentioning
confidence: 99%
“…To demonstrate this approach, the authors have designed an implementation of TrustZone, including 10+ security bugs. Similarly the authors of [166] present a formally defined hardware security enforcement for x86 architecture. In this setting, the software relies on underlying hardware for security enforcement, for example memory paging features of an x86 CPU.…”
Section: Protocols the Area Of Consumer Communication Protocols Cover...mentioning
confidence: 99%
“…FreeSpec follows our previous work named SpecCert [1], whose lack of modularity complexified scalability. Kami [13] shares many concepts with FreeSpec, but implements them in a totally different manner: components are defined as labelled transition systems and can be extracted into FPGA bitstreams.…”
Section: Related Workmentioning
confidence: 99%
“…The latter scenario may lead to a situation where every component seems to be working as expected, but their composition creates an attack path. We name this class of security vulnerabilities "architectural attacks" [1]. Over the past decade, many critical vulnerabilities affecting computing systems, in particular those relying on the x86 architecture, have raised awareness about the threat posed by architectural attacks.…”
Section: Introductionmentioning
confidence: 99%