Hardware information flow tracking

W Hu, A Ardeshiricham, R Kastner - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …

TAG: Tagged architecture guide

S Jero, N Burow, B Ward, R Skowyra, R Khazan… - ACM Computing …, 2022 - dl.acm.org
Software security defenses are routinely broken by the persistence of both security
researchers and attackers. Hardware solutions based on tagging are emerging as a …

{CellIFT}: Leveraging cells for scalable and precise dynamic information flow tracking in {RTL}

F Solt, B Gras, K Razavi - 31st USENIX Security Symposium (USENIX …, 2022 - usenix.org
Dynamic Information Flow Tracking (dynamic IFT) is a well-known technique with many
security applications such as analyzing the behavior of a system given an input and …

High-level synthesis of key-obfuscated RTL IP with design lockout and camouflaging

SA Islam, LK Sah, S Katkoori - ACM Transactions on Design Automation …, 2020 - dl.acm.org
We propose three orthogonal techniques to secure Register-Transfer-Level (RTL)
Intellectual Property (IP). In the first technique, the key-based RTL obfuscation scheme is …

Towards secure composition of integrated circuits and electronic systems: On the role of EDA

J Knechtel, EB Kavun, F Regazzoni… - … , Automation & Test …, 2020 - ieeexplore.ieee.org
Modern electronic systems become evermore complex, yet remain modular, with integrated
circuits (ICs) acting as versatile hardware components at their heart. Electronic design …

EVEREST: A design environment for extreme-scale big data analytics on heterogeneous platforms

C Pilato, S Bohm, F Brocheton… - … , Automation & Test …, 2021 - ieeexplore.ieee.org
High-Performance Big Data Analytics (HPDA) applications are characterized by huge
volumes of distributed and heterogeneous data that require efficient computation for …

Optimized and automated secure ic design flow: A defense-in-depth approach

KI Gubbi, BS Latibari, MA Chowdhury… - … on Circuits and …, 2024 - ieeexplore.ieee.org
The globalization of the manufacturing process and the supply chain for electronic hardware
has been driven by the need to maximize profitability while lowering risk in a technologically …

Analyzing security vulnerabilities induced by high-level synthesis

N Pundir, S Aftabjahani, R Cammarota… - ACM Journal on …, 2022 - dl.acm.org
High-level synthesis (HLS) is essential to map the high-level language (HLL) description
(eg, in C/C++) of hardware design to the corresponding Register Transfer Level (RTL) to …

Challenges and opportunities for practical and effective dynamic information flow tracking

C Brant, P Shrestha, B Mixon-Baca, K Chen… - ACM Computing …, 2021 - dl.acm.org
Information flow tracking was proposed more than 40 years ago to address the limitations of
access control mechanisms to guarantee the confidentiality and integrity of information …

Isadora: Automated information flow property generation for hardware designs

C Deutschbein, A Meza, F Restuccia… - Proceedings of the 5th …, 2021 - dl.acm.org
Isadora is a methodology for creating information flow specifications of hardware designs.
The methodology combines information flow tracking and specification mining to produce a …