Hardware information flow tracking

W Hu, A Ardeshiricham, R Kastner - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …

Llm for soc security: A paradigm shift

D Saha, S Tarek, K Yahyaei, SK Saha, J Zhou… - IEEE …, 2024 - ieeexplore.ieee.org
As the ubiquity and complexity of system-on-chip (SoC) designs increase across electronic
devices, incorporating security into an SoC design flow poses significant challenges …

SoK: Computer-aided cryptography

M Barbosa, G Barthe, K Bhargavan… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Computer-aided cryptography is an active area of research that develops and applies
formal, machine-checkable approaches to the design, analysis, and implementation of …

A hardware design language for timing-sensitive information-flow security

D Zhang, Y Wang, GE Suh, AC Myers - Acm Sigplan Notices, 2015 - dl.acm.org
Information security can be compromised by leakage via low-level hardware features. One
recently prominent example is cache probing attacks, which rely on timing channels created …

The unpatchable silicon: a full break of the bitstream encryption of xilinx 7-series {FPGAs}

M Ender, A Moradi, C Paar - 29th USENIX Security Symposium (USENIX …, 2020 - usenix.org
The security of FPGAs is a crucial topic, as any vulnerability within the hardware can have
severe consequences, if they are used in a secure design. Since FPGA designs are …

On subnormal floating point and abnormal timing

M Andrysco, D Kohlbrenner, K Mowery… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
We identify a timing channel in the floating point instructions of modern x86 processors: the
running time of floating point addition and multiplication instructions can vary by two orders …

{TheHuzz}: Instruction fuzzing of processors using {Golden-Reference} models for finding {Software-Exploitable} vulnerabilities

R Kande, A Crump, G Persyn, P Jauernig… - 31st USENIX Security …, 2022 - usenix.org
The increasing complexity of modern processors poses many challenges to existing
hardware verification tools and methodologies for detecting security-critical bugs. Recent …

{HardFails}: insights into {software-exploitable} hardware bugs

G Dessouky, D Gens, P Haney, G Persyn… - 28th USENIX Security …, 2019 - usenix.org
Modern computer systems are becoming faster, more efficient, and increasingly
interconnected with each generation. Thus, these platforms grow more complex, with new …

Register transfer level information flow tracking for provably secure hardware design

A Ardeshiricham, W Hu, J Marxen… - Design, Automation & …, 2017 - ieeexplore.ieee.org
Information Flow Tracking (IFT) provides a formal methodology for modeling and reasoning
about security properties related to integrity, confidentiality, and logical side channel …

A formal foundation for secure remote execution of enclaves

P Subramanyan, R Sinha, I Lebedev… - Proceedings of the …, 2017 - dl.acm.org
Recent proposals for trusted hardware platforms, such as Intel SGX and the MIT Sanctum
processor, offer compelling security features but lack formal guarantees. We introduce a …