Title :
Evaluating security requirements in a general-purpose processor by combining assertion checkers with code coverage
Author :
Bilzor, Michael ; Huffmire, Ted ; Irvine, Cynthia ; Levin, Tim
Author_Institution :
U.S. Naval Acad., Annapolis, MD, USA
Abstract :
The problem of malicious inclusions in hardware is an emerging threat, and detecting them is a difficult challenge. In this research, we enhance an existing method for creating assertion-based dynamic checkers, and demonstrate how behavioral security requirements can be derived from a processor´s architectural specification, then converted into security checkers that are part of the processor´s design. The novel contributions of this research are: - We demonstrate the method using a set of assertions, derived from the architectural specification, on a full-scale open-source general-purpose processor design, called OpenRISC. Previous work used only a single assertion on a toy processor design. - We demonstrate the use of our checker-generator tool, called psl2hdl, which was created for this research. - We illustrate how the method can be used in concert with code coverage techniques, to either detect malicious inclusions or greatly narrow the search for malicious inclusions that use rare-event triggers.
Keywords :
general purpose computers; multiprocessing systems; security of data; OpenRISC; architectural specification; assertion-based dynamic checkers; behavioral security requirements; checker-generator tool; code coverage; full-scale open-source general-purpose processor design; malicious inclusions; psl2hdl; toy processor design; Automata; Generators; Hardware; Hardware design languages; Monitoring; Security; Software;
Conference_Titel :
Hardware-Oriented Security and Trust (HOST), 2012 IEEE International Symposium on
Conference_Location :
San Francisco, CA
Print_ISBN :
978-1-4673-2341-3
DOI :
10.1109/HST.2012.6224318