[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/2616606.2617057acmotherconferencesArticle/Chapter ViewAbstractPublication PagesdateConference Proceedingsconference-collections
research-article

Formal verification of taint-propagation security properties in a commercial SoC design

Published: 24 March 2014 Publication History

Abstract

SoCs embedded in mobile phones, tablets and other smart devices come equipped with numerous features that impose specific security requirements on their hardware and firmware. Many security requirements can be formulated as taint-propagation properties that verify information flow between a set of signals in the design. In this work, we take a tablet SoC design, formulate its critical security requirements as taint-propagation properties, and prove them using a formal verification flow. We describe the properties targeted, techniques to help the verifier scale, and security bugs uncovered in the process.

References

[1]
Android Documentation: Camera.Face. https://developer.android.com/reference/android/hardware/Camera.Face.html, 2011.
[2]
Google Wallet. http://www.google.com/wallet/, 2013.
[3]
Widevine DRM. http://www.widevine.com/, 2013.
[4]
David W. Palmer and Parbati Kumar Manna. An Efficient Algorithm for Identifying Security Relevant Logic and Vulnerabilities in RTL Designs. In Proc. of HOST, 2013.

Cited By

View all
  • (2019)CAD-BaseACM Transactions on Design Automation of Electronic Systems10.1145/331557424:4(1-30)Online publication date: 18-Apr-2019
  • (2018)Formal security verification of concurrent firmware in SoCs using instruction-level abstraction for hardwareProceedings of the 55th Annual Design Automation Conference10.1145/3195970.3196055(1-6)Online publication date: 24-Jun-2018
  • (2017)Learning to Produce Direct Tests for Security Verification Using Constrained Process DiscoveryProceedings of the 54th Annual Design Automation Conference 201710.1145/3061639.3062271(1-6)Online publication date: 18-Jun-2017
  • Show More Cited By

Index Terms

  1. Formal verification of taint-propagation security properties in a commercial SoC design

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      DATE '14: Proceedings of the conference on Design, Automation & Test in Europe
      March 2014
      1959 pages
      ISBN:9783981537024

      Sponsors

      • EDAA: European Design Automation Association
      • ECSI
      • EDAC: Electronic Design Automation Consortium
      • IEEE Council on Electronic Design Automation (CEDA)
      • The Russian Academy of Sciences: The Russian Academy of Sciences

      In-Cooperation

      Publisher

      European Design and Automation Association

      Leuven, Belgium

      Publication History

      Published: 24 March 2014

      Check for updates

      Qualifiers

      • Research-article

      Conference

      DATE '14
      Sponsor:
      • EDAA
      • EDAC
      • The Russian Academy of Sciences
      DATE '14: Design, Automation and Test in Europe
      March 24 - 28, 2014
      Dresden, Germany

      Acceptance Rates

      Overall Acceptance Rate 518 of 1,794 submissions, 29%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 13 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2019)CAD-BaseACM Transactions on Design Automation of Electronic Systems10.1145/331557424:4(1-30)Online publication date: 18-Apr-2019
      • (2018)Formal security verification of concurrent firmware in SoCs using instruction-level abstraction for hardwareProceedings of the 55th Annual Design Automation Conference10.1145/3195970.3196055(1-6)Online publication date: 24-Jun-2018
      • (2017)Learning to Produce Direct Tests for Security Verification Using Constrained Process DiscoveryProceedings of the 54th Annual Design Automation Conference 201710.1145/3061639.3062271(1-6)Online publication date: 18-Jun-2017
      • (2017)A synthetic research on the multimedia data encryption based mobile computing security enhancement model and multi-channel mobile human computer interaction frameworkMultimedia Tools and Applications10.1007/s11042-016-3662-176:16(16963-16987)Online publication date: 1-Aug-2017
      • (2016)Invited - Specification and modeling for systems-on-chip security verificationProceedings of the 53rd Annual Design Automation Conference10.1145/2897937.2911991(1-6)Online publication date: 5-Jun-2016
      • (2015)Template-based synthesis of instruction-level abstractions for SoC verificationProceedings of the 15th Conference on Formal Methods in Computer-Aided Design10.5555/2893529.2893557(160-167)Online publication date: 27-Sep-2015
      • (2015)Detecting malicious modifications of data in third-party intellectual property coresProceedings of the 52nd Annual Design Automation Conference10.1145/2744769.2744823(1-6)Online publication date: 7-Jun-2015

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media