Abstract | ||
---|---|---|
Hardware-software security architectures can significantly improve the security provided to computer users. However, we are lacking a security verification methodology that can provide design-time verification of the security properties provided by such architectures. While verification of an entire hardware-software security architecture is very difficult today, this paper proposes a methodology for verifying essential aspects of the architecture. We use attestation protocols proposed by different hardware security architectures as examples of such essential aspects. Attestation is an important and interesting new requirement for having trust in a remote computer, e.g., in a cloud computing scenario. We use a finite-state model checker to model the system and the attackers, and check the security of the protocols against attacks. We provide new actionable heuristics for designing invariants that are validated by the model checker and thus used to detect potential attacks. The verification ensures that the invariants hold and the protocol is secure. Otherwise, the protocol design is updated on a failure and the verification is re-run. |
Year | DOI | Venue |
---|---|---|
2012 | 10.1109/MICROW.2012.16 | MICRO Workshops |
Keywords | DocType | ISBN |
protocol design,finite state machines,hardware-enabled attestation protocols,hardware-software security architecture,design-time verification,security verification,software architecture,security properties,cryptographic protocols,security verification methodology,remote computer,program verification,finite state model checker | Conference | 978-1-4673-4920-8 |
Citations | PageRank | References |
0 | 0.34 | 24 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Tianwei Zhang | 1 | 86 | 21.44 |
Jakub Szefer | 2 | 398 | 37.00 |
Ruby Lee | 3 | 2460 | 261.28 |