Hardware information flow tracking

W Hu, A Ardeshiricham, R Kastner - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …

Processor hardware security vulnerabilities and their detection by unique program execution checking

MR Fadiheh, D Stoffel, C Barrett… - … Design, Automation & …, 2019 - ieeexplore.ieee.org
Recent discovery of security attacks in advanced processors, known as Spectre and
Meltdown, has resulted in high public alertness about security of hardware. The root cause …

TaintFuzzer: SoC security verification using taint inference-enabled fuzzing

MM Hossain, NF Dipu, KZ Azar… - 2023 IEEE/ACM …, 2023 - ieeexplore.ieee.org
Modern System-on-Chip (SoC) designs containing sensitive information have become
targets of malicious attacks. Unfortunately, current verification practices still undermine the …

An exhaustive approach to detecting transient execution side channels in RTL designs of processors

MR Fadiheh, A Wezel, J Müller… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Hardware (HW) security issues have been emerging at an alarming rate in recent years.
Transient execution attacks, such as Spectre and Meltdown, in particular, pose a genuine …

Saif: Automated asset identification for security verification at the register transfer level

N Farzana, A Ayalasomayajula… - 2021 IEEE 39th VLSI …, 2021 - ieeexplore.ieee.org
With the increasing complexity, modern system-onchip (SoC) designs are becoming more
susceptible to security attacks and require comprehensive security assurance. However …

Transys: Leveraging common security properties across hardware designs

R Zhang, C Sturton - 2020 IEEE Symposium on Security and …, 2020 - ieeexplore.ieee.org
This paper presents Transys, a tool for translating security critical properties written for one
hardware design to analogous properties suitable for a second design. Transys works in …

Security path verification through joint information flow analysis

W Hu, X Wang, D Mu - 2018 IEEE Asia Pacific Conference on …, 2018 - ieeexplore.ieee.org
Security path verification is an effective measure for identifying design paths that can lead to
security violations. However, existing techniques in this realm typically lack the flexibility in …

Unique Program Execution Checking: A Novel Approach for Formal Security Analysis of Hardware

M Rahmani Fadiheh - 2022 - kluedo.ub.rptu.de
This thesis addresses the need for a new approach to hardware sign-off verification which
guarantees the security of processors at the Register Transfer Level (RTL). To this end, we …

[LIBRO][B] Towards Automated Security Validation for Hardware Designs

R Zhang - 2020 - search.proquest.com
Hardware provides the foundation of trust for computer systems. Defects in hardware
designs routinely cause vulnerabilities that are exploitable by malicious software and …