• DocumentCode
    30649
  • Title

    A bottom-up approach to verifiable embedded system information flow security

  • Author

    Dejun Mu ; Wei Hu ; Baolei Mao ; Bo Ma

  • Author_Institution
    Sch. of Autom., Northwestern Polytech. Univ., Xian, China
  • Volume
    8
  • Issue
    1
  • fYear
    2014
  • fDate
    Jan. 2014
  • Firstpage
    12
  • Lastpage
    17
  • Abstract
    With the wide deployment of embedded systems and constant increase in their inter-connections, embedded systems tend to be confronted with attacks through security holes that are hard to predict using typical security measures such as access control or data encryption. To eliminate these security holes, embedded security should be accounted for during the design phase from all abstraction levels with effective measures taken to prevent unintended interference between different system components caused by harmful flows of information. This study proposes a bottom-up approach to designing verifiably information flow secure embedded systems. The proposed method enables tight information flow controls by monitoring all flows of information from the level of Boolean gates. It lays a solid foundation to information flow security in the underlying hardware and exposes the ability to prove security properties to all abstraction levels in the entire system stack. With substantial amounts of modifications made to the instruction set architecture, operating system, programming language and input/output architecture, the target system can be designed to be verifiably information flow secure.
  • Keywords
    embedded systems; formal verification; instruction sets; operating systems (computers); security of data; access control; bottom up approach; data encryption; information flow controls; input-output architecture; instruction set architecture; operating system; programming language; security holes; verifiable embedded system information flow security;
  • fLanguage
    English
  • Journal_Title
    Information Security, IET
  • Publisher
    iet
  • ISSN
    1751-8709
  • Type

    jour

  • DOI
    10.1049/iet-ifs.2012.0342
  • Filename
    6687153