Isadora is a methodology for creating information flow specifications of hardware designs. The methodology combines information flow tracking and specification mining to produce a set of information flow properties that are suitable for use during the security validation process, and which support a better understanding of the security posture of the design. Isadora is fully automated; the user provides only the design under consideration and a testbench and need not supply a threat model nor security specifications. We evaluate Isadora on a RISC-V processor plus two designs related to SoC access control. Isadora generates security properties that align with those suggested by the Common Weakness Enumerations (CWEs), and in the case of the SoC designs, align with the properties written manually by security experts.
翻译:Isadora是设计硬件设计的信息流通规格的一种方法,该方法将信息流通追踪和规格开采结合起来,以产生一套适合安全验证过程中使用的信息流通特性,有助于更好地了解设计的安全态势;Isadora完全自动化;用户仅提供正在审议的设计,测试台,不需要提供威胁模型或安全规格;我们对IRSC-V处理器的Isadora进行了评估,并增加了两个与 SoC入口控制有关的设计;Isadora生成的安全特性与共同弱点统计(CWES)建议的安全特性相一致;对于SOC的设计,则与安全专家手写的特性相一致。