Title :
A bottom-up approach to verifiable embedded system information flow security
Author :
Dejun Mu ; Wei Hu ; Baolei Mao ; Bo Ma
Author_Institution :
Sch. of Autom., Northwestern Polytech. Univ., Xian, China
Abstract :
With the wide deployment of embedded systems and constant increase in their inter-connections, embedded systems tend to be confronted with attacks through security holes that are hard to predict using typical security measures such as access control or data encryption. To eliminate these security holes, embedded security should be accounted for during the design phase from all abstraction levels with effective measures taken to prevent unintended interference between different system components caused by harmful flows of information. This study proposes a bottom-up approach to designing verifiably information flow secure embedded systems. The proposed method enables tight information flow controls by monitoring all flows of information from the level of Boolean gates. It lays a solid foundation to information flow security in the underlying hardware and exposes the ability to prove security properties to all abstraction levels in the entire system stack. With substantial amounts of modifications made to the instruction set architecture, operating system, programming language and input/output architecture, the target system can be designed to be verifiably information flow secure.
Keywords :
embedded systems; formal verification; instruction sets; operating systems (computers); security of data; access control; bottom up approach; data encryption; information flow controls; input-output architecture; instruction set architecture; operating system; programming language; security holes; verifiable embedded system information flow security;
Journal_Title :
Information Security, IET
DOI :
10.1049/iet-ifs.2012.0342