z-logo
open-access-imgOpen Access
A Hardware Design Language for Timing-Sensitive Information-Flow Security
Author(s) -
Danfeng Zhang,
Yao Wang,
G. Edward Suh,
Andrew C. Myers
Publication year - 2015
Publication title -
citeseer x (the pennsylvania state university)
Language(s) - English
Resource type - Conference proceedings
ISSN - 0163-5964
DOI - 10.1145/2694344.2694372
Subject(s) - computer science , information flow , hardware description language , information leakage , embedded system , hardware security module , design flow , verilog , cache , overhead (engineering) , computer hardware , hardware compatibility list , field programmable gate array , cryptography , programming language , operating system , computer security , hardware architecture , software , philosophy , linguistics
Information security can be compromised by leakage via low-level hardware features. One recently prominent example is cache probing attacks, which rely on timing channels created by caches. We introduce a hardware design language, SecVerilog, which makes it possible to statically analyze information flow at the hardware level. With SecVerilog, systems can be built with verifiable control of timing channels and other information channels. SecVerilog is Verilog, extended with expressive type annotations that enable precise reasoning about information flow. It also comes with rigorous formal assurance: we prove that SecVerilog enforces timing-sensitive noninterference and thus ensures secure information flow. By building a secure MIPS processor and its caches, we demonstrate that SecVerilog makes it possible to build complex hardware designs with verified security, yet with low overhead in time, space, and HW designer effort.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom