Title :
Security Checkers: Detecting processor malicious inclusions at runtime
Author :
Bilzor, Michael ; Huffmire, Ted ; Irvine, Cynthia ; Levin, Tim
Abstract :
To counter the growing threat of malicious subversions to the design of a microprocessor, there is a great need for simple, automated methods for detecting such malevolent changes. Based on the adoption of the Property Specification Language (PSL) for behavioral verification, and the advent of tools for automatically generating synthesizable hardware design language (HDL) constructs for verifying a PSL assertion, we propose a new method called Security Checkers, which uses security-focused PSL assertions to create hardware design units for detecting malicious inclusions at runtime. We describe the process flow for creating Security Checkers and demonstrate by example how they can be used to detect malicious inclusions in a processor design. Because the checkers can be used in simulation, FPGA emulation, or as part of a fabricated design, we illustrate how this technique can be used to detect malicious inclusions over a much broader segment of the processor development lifecycle, compared to existing methods.
Keywords :
formal verification; security of data; specification languages; FPGA emulation; behavioral verification; hardware design language; processor malicious inclusion detection; property specification language; security checkers; security-focused PSL assertions; Hardware; Hardware design languages; Plasmas; Registers; Runtime; Security; Software;
Conference_Titel :
Hardware-Oriented Security and Trust (HOST), 2011 IEEE International Symposium on
Conference_Location :
San Diego CA
Print_ISBN :
978-1-4577-1059-9
DOI :
10.1109/HST.2011.5954992