Verification of a Practical Hardware Security Architecture Through Static Information Flow Analysis
نویسندگان
چکیده
منابع مشابه
Architecture Based Information Flow Analysis for Software Security
Using information flow modeling to perform security analysis is a common technique used during software design. While much theoretical work has been conducted in this area, there are few tools to assist with such analysis. In many instances the security analysis must be done by hand, requiring considerable expertise, time, and effort. Most of the available tools require custom code to be writte...
متن کاملStatic Signature Verification by Optical Flow Analysis
paper presents a new approach for static signature verification based on optical flow. In the first part of the paper, optical flow is used for estimating local stability of static signatures. In the second part, signature verification is performed by the analysis of optical flow, using an alternating decision tree. The experimental tests, carried out on signature of the GPDS database, demonstr...
متن کاملFrom Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware
متن کامل
SecChisel: Language and Tool for Practical and Scalable Security Verification of Security-Aware Hardware Architectures
Due to lack of practical and scalable security verification tools and methodologies, very few of the existing hardware-software security architectures have been thoroughly checked at the design time. To address this issue, our project develops a security verification methodology that is applicable to different hardware-software security architectures during the design phase. The verification fr...
متن کاملStatic Information Flow Analysis of Workflow Models
This paper proposes a framework for the detection of information leaks in workflow descriptions based on static information flow analysis. Despite the correct deployment of access control mechanisms, certain information leaks can persist, thereby undermining the compliance of workflows to policies. The framework put forward in this paper identifies leaks induced by the structure of the workflow...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM SIGARCH Computer Architecture News
سال: 2017
ISSN: 0163-5964
DOI: 10.1145/3093337.3037739