Verification of a Practical Hardware Security Architecture Through Static Information Flow Analysis

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Architecture Based Information Flow Analysis for Software Security

Using information flow modeling to perform security analysis is a common technique used during software design. While much theoretical work has been conducted in this area, there are few tools to assist with such analysis. In many instances the security analysis must be done by hand, requiring considerable expertise, time, and effort. Most of the available tools require custom code to be writte...

متن کامل

Static Signature Verification by Optical Flow Analysis

paper presents a new approach for static signature verification based on optical flow. In the first part of the paper, optical flow is used for estimating local stability of static signatures. In the second part, signature verification is performed by the analysis of optical flow, using an alternating decision tree. The experimental tests, carried out on signature of the GPDS database, demonstr...

متن کامل

SecChisel: Language and Tool for Practical and Scalable Security Verification of Security-Aware Hardware Architectures

Due to lack of practical and scalable security verification tools and methodologies, very few of the existing hardware-software security architectures have been thoroughly checked at the design time. To address this issue, our project develops a security verification methodology that is applicable to different hardware-software security architectures during the design phase. The verification fr...

متن کامل

Static Information Flow Analysis of Workflow Models

This paper proposes a framework for the detection of information leaks in workflow descriptions based on static information flow analysis. Despite the correct deployment of access control mechanisms, certain information leaks can persist, thereby undermining the compliance of workflows to policies. The framework put forward in this paper identifies leaks induced by the structure of the workflow...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM SIGARCH Computer Architecture News

سال: 2017

ISSN: 0163-5964

DOI: 10.1145/3093337.3037739