首页> 外文会议>Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust >Synthesis of hardware sandboxes for Trojan mitigation in systems on chip
【24h】

Synthesis of hardware sandboxes for Trojan mitigation in systems on chip

机译:片上系统中用于缓解特洛伊木马的硬件沙箱的综合

获取原文
获取原文并翻译 | 示例

摘要

In this work, we propose a design flow for automatic generation of hardware sandboxes purposed for IP security in trusted system-on-chips (SoCs). Our tool CAPSL, the Component Authentication Process for Sandboxed Layouts, is capable of detecting trojan activation and nullifying possible damage to a system at run-time, avoiding complex pre-fabrication and pre-deployment testing for trojans. Our approach captures the behavioral properties of non-trusted IPs, typically from a third-party or components off the shelf (COTS), with the formalism of interface automata and the Property Specification Language's sequential extended regular expressions (SERE). Using the concept of hardware sandboxing, we translate the property specifications to checker automata and partition an untrusted sector of the system, with included virtualized resources and controllers, to isolate sandbox-system interactions upon deviation from the behavioral checkers. Our design flow is verified with benchmarks from Trust-Hub.org, which show 100% trojan detection with reduced checker overhead compared to other run-time verification techniques.
机译:在这项工作中,我们提出了一种自动生成可用于受信任的片上系统(SoC)中IP安全的硬件沙箱的设计流程。我们的工具CAPSL(沙盒布局的组件身份验证过程)能够检测木马激活并在运行时消除对系统的可能损害,从而避免了对木马进行复杂的预制和预部署测试。我们的方法使用接口自动机和属性规范语言的顺序扩展正则表达式(SERE)的形式,捕获通常来自第三方或现成组件(COTS)的不可信IP的行为属性。使用硬件沙箱的概念,我们将属性规范转换为检查器自动机,并对系统的不受信任扇区(包括虚拟化资源和控制器)进行分区,以隔离行为偏离检查器的沙盒系统交互。我们的设计流程已通过Trust-Hub.org的基准进行了验证,与其他运行时验证技术相比,该基准显示出100%的木马检测和更少的检查程序开销。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号