On the Complexity of Generating Gate Level Information Flow Tracking Logic

Wei Hu,Jason Oberg,Ali Irturk,Mohit Tiwari,Timothy Sherwood,Dejun Mu,Ryan Kastner
DOI: https://doi.org/10.1109/TIFS.2012.2189105
IF: 7.231
2012-01-01
IEEE Transactions on Information Forensics and Security
Abstract:Hardware-based side channels are known to expose hard-to-detect security holes enabling attackers to get a foothold into the system to perform malicious activities. Despite this fact, security is rarely accounted for in hardware design flows. As a result, security holes are often only identified after significant damage has been inflicted. Recently, gate level information flow tracking (GLIFT) has been proposed to verify information flow security at the level of Boolean gates. GLIFT is able to detect all logical flows including hardware specific timing channels, which is useful for ensuring properties related to confidentiality and integrity and can even provide real-time guarantees on system behavior. GLIFT can be integrated into the standard hardware design, testing and verification process to eliminate unintended information flows in the target design. However, generating GLIFT logic is a difficult problem due to its inherent complexity and the potential losses in precision. This paper provides a formal basis for deriving GLIFT logic which includes a proof on the NP-completeness of generating precise GLIFT logic and a formal analysis of the complexity and precision of various GLIFT logic generation algorithms. Experimental results using IWLS benchmarks provide a practical understanding of the computational complexity.
What problem does this paper attempt to address?