QFlow: Quantitative Information Flow for Security-Aware Hardware Design in Verilog

09/06/2021
by   Lennart M. Reimann, et al.
0

The enormous amount of code required to design modern hardware implementations often leads to critical vulnerabilities being overlooked. Especially vulnerabilities that compromise the confidentiality of sensitive data, such as cryptographic keys, have a major impact on the trustworthiness of an entire system. Information flow analysis can elaborate whether information from sensitive signals flows towards outputs or untrusted components of the system. But most of these analytical strategies rely on the non-interference property, stating that the untrusted targets must not be influenced by the source's data, which is shown to be too inflexible for many applications. To address this issue, there are approaches to quantify the information flow between components such that insignificant leakage can be neglected. Due to the high computational complexity of this quantification, approximations are needed, which introduce mispredictions. To tackle those limitations, we reformulate the approximations. Further, we propose a tool QFlow with a higher detection rate than previous tools. It can be used by non-experienced users to identify data leakages in hardware designs, thus facilitating a security-aware design process.

READ FULL TEXT
research
08/04/2023

SoftFlow: Automated HW-SW Confidentiality Verification for Embedded Processors

Despite its ever-increasing impact, security is not considered as a desi...
research
04/12/2023

Automated Information Flow Analysis for Integrated Computing-in-Memory Modules

Novel non-volatile memory (NVM) technologies offer high-speed and high-d...
research
11/30/2022

Quantitative Information Flow for Hardware: Advancing the Attack Landscape

Security still remains an afterthought in modern Electronic Design Autom...
research
06/17/2021

Intentional Forgetting

Many damaging cybersecurity attacks are enabled when an attacker can acc...
research
04/12/2023

Information Flow Coverage Metrics for Hardware Security Verification

Security graphs model attacks, defenses, mitigations, and vulnerabilitie...
research
06/04/2020

Data-Flow-Based Extension of the System-Theoretic Process Analysis for Security (STPA-Sec)

Security analysis is an essential activity in security engineering to id...
research
03/22/2022

ANOSY: Approximated Knowledge Synthesis with Refinement Types for Declassification

Non-interference is a popular way to enforce confidentiality of sensitiv...

Please sign up or login with your details

Forgot password? Click here to reset