Hardware information flow tracking
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …
understand how information moves through a computing system. Hardware IFT techniques …
Processor hardware security vulnerabilities and their detection by unique program execution checking
Recent discovery of security attacks in advanced processors, known as Spectre and
Meltdown, has resulted in high public alertness about security of hardware. The root cause …
Meltdown, has resulted in high public alertness about security of hardware. The root cause …
TaintFuzzer: SoC security verification using taint inference-enabled fuzzing
Modern System-on-Chip (SoC) designs containing sensitive information have become
targets of malicious attacks. Unfortunately, current verification practices still undermine the …
targets of malicious attacks. Unfortunately, current verification practices still undermine the …
An exhaustive approach to detecting transient execution side channels in RTL designs of processors
Hardware (HW) security issues have been emerging at an alarming rate in recent years.
Transient execution attacks, such as Spectre and Meltdown, in particular, pose a genuine …
Transient execution attacks, such as Spectre and Meltdown, in particular, pose a genuine …
Saif: Automated asset identification for security verification at the register transfer level
With the increasing complexity, modern system-onchip (SoC) designs are becoming more
susceptible to security attacks and require comprehensive security assurance. However …
susceptible to security attacks and require comprehensive security assurance. However …
Transys: Leveraging common security properties across hardware designs
R Zhang, C Sturton - 2020 IEEE Symposium on Security and …, 2020 - ieeexplore.ieee.org
This paper presents Transys, a tool for translating security critical properties written for one
hardware design to analogous properties suitable for a second design. Transys works in …
hardware design to analogous properties suitable for a second design. Transys works in …
Security path verification through joint information flow analysis
W Hu, X Wang, D Mu - 2018 IEEE Asia Pacific Conference on …, 2018 - ieeexplore.ieee.org
Security path verification is an effective measure for identifying design paths that can lead to
security violations. However, existing techniques in this realm typically lack the flexibility in …
security violations. However, existing techniques in this realm typically lack the flexibility in …
Unique Program Execution Checking: A Novel Approach for Formal Security Analysis of Hardware
M Rahmani Fadiheh - 2022 - kluedo.ub.rptu.de
This thesis addresses the need for a new approach to hardware sign-off verification which
guarantees the security of processors at the Register Transfer Level (RTL). To this end, we …
guarantees the security of processors at the Register Transfer Level (RTL). To this end, we …
[LIBRO][B] Towards Automated Security Validation for Hardware Designs
R Zhang - 2020 - search.proquest.com
Hardware provides the foundation of trust for computer systems. Defects in hardware
designs routinely cause vulnerabilities that are exploitable by malicious software and …
designs routinely cause vulnerabilities that are exploitable by malicious software and …