...
首页> 外文期刊>IEEE transactions on information forensics and security >Eliminating the Hardware-Software Boundary: A Proof-Carrying Approach for Trust Evaluation on Computer Systems
【24h】

Eliminating the Hardware-Software Boundary: A Proof-Carrying Approach for Trust Evaluation on Computer Systems

机译:消除软硬件边界:一种用于计算机系统信任评估的证明方法

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

The wide usage of hardware intellectual property (IP) cores and software programs from untrusted third-party vendors has raised security concerns for computer system designers. The existing approaches, designed to ensure the trustworthiness of either the hardware IP cores or to verify software programs, rarely secure the entire computer system. The semantic gap between the hardware and the software lends to the challenge of securing computer systems. In this paper, we propose a new unified framework to represent both the hardware infrastructure and the software program in the same formal language. As a result, the semantic gap between the hardware and the software is bridged, enabling the development of system-level security properties for the entire computer system. Our unified framework uses a cross-domain formal verification method to protect the entire computer system within the scope of proof-carrying hardware. The working procedure of the unified framework is demonstrated with a sample embedded system which includes an 8051 microprocessor and an RC5 encryption program. In our demonstration, we show that the embedded system is trusted if the system level security properties are provable. Supported by the unified framework, the system designers/integrators will be able to formally verify the trustworthiness of the computer system integrated with hardware and software both from untrusted third-party vendors.
机译:来自不受信任的第三方供应商的硬件知识产权(IP)内核和软件程序的广泛使用引起了计算机系统设计人员的安全问题。现有的旨在确保硬件IP核的可信赖性或用于验证软件程序的方法很少保护整个计算机系统。硬件和软件之间的语义鸿沟带来了保护计算机系统安全的挑战。在本文中,我们提出了一个新的统一框架,以相同的形式语言来表示硬件基础结构和软件程序。结果,硬件和软件之间的语义鸿沟得以弥合,从而为整个计算机系统开发了系统级安全性属性。我们的统一框架使用跨域形式验证方法来保护带有证据的硬件范围内的整个计算机系统。通过一个示例嵌入式系统演示了统一框架的工作过程,该嵌入式系统包括8051微处理器和RC5加密程序。在我们的演示中,我们证明了如果可以证明系统级的安全性,则嵌入式系统是受信任的。在统一框架的支持下,系统设计者/集成商将能够正式验证不可信第三方供应商提供的与硬件和软件相集成的计算机系统的可信赖性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号