Security of SoC firmware load protocols. Krstić, S., Yang, J., Palmer, D. W., Osborne, R. B., & Talmor, E. In 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pages 70–75, May, 2014. doi abstract bibtex The security architecture of modern systems-on-a-chip (SoC) is complex and critical to be done right and quickly. SoC security architects feel an acute need for new tool-supported specification and validation technologies. Aiming to stimulate research into creation of these technologies, in this paper we provide some industrial insights and initial solutions. Focusing on a concrete non-trivial example of security sensitive firmware load protocols, we show how to: (1) concisely specify the communication between IP blocks; (2) model the adversary; (3) debug and verify the protocol.
@inproceedings{krstic_security_2014,
title = {Security of {SoC} firmware load protocols},
doi = {10.1109/HST.2014.6855571},
abstract = {The security architecture of modern systems-on-a-chip (SoC) is complex and critical to be done right and quickly. SoC security architects feel an acute need for new tool-supported specification and validation technologies. Aiming to stimulate research into creation of these technologies, in this paper we provide some industrial insights and initial solutions. Focusing on a concrete non-trivial example of security sensitive firmware load protocols, we show how to: (1) concisely specify the communication between IP blocks; (2) model the adversary; (3) debug and verify the protocol.},
booktitle = {2014 {IEEE} {International} {Symposium} on {Hardware}-{Oriented} {Security} and {Trust} ({HOST})},
author = {Krstić, S. and Yang, J. and Palmer, D. W. and Osborne, R. B. and Talmor, E.},
month = may,
year = {2014},
keywords = {\#broken, Authentication, Hardware, IP blocks, IP networks, Jab/\#HOST, Load modeling, Protocols, SoC firmware load protocol security, System-on-chip, cryptographic protocols, firmware, security architecture, security sensitive firmware load protocols, system-on-chip, systems-on-a-chip, tool-supported specification, validation technology},
pages = {70--75},
}
Downloads: 0
{"_id":"yBBW83MkRuiTz79go","bibbaseid":"krsti-yang-palmer-osborne-talmor-securityofsocfirmwareloadprotocols-2014","author_short":["Krstić, S.","Yang, J.","Palmer, D. W.","Osborne, R. B.","Talmor, E."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"Security of SoC firmware load protocols","doi":"10.1109/HST.2014.6855571","abstract":"The security architecture of modern systems-on-a-chip (SoC) is complex and critical to be done right and quickly. SoC security architects feel an acute need for new tool-supported specification and validation technologies. Aiming to stimulate research into creation of these technologies, in this paper we provide some industrial insights and initial solutions. Focusing on a concrete non-trivial example of security sensitive firmware load protocols, we show how to: (1) concisely specify the communication between IP blocks; (2) model the adversary; (3) debug and verify the protocol.","booktitle":"2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","author":[{"propositions":[],"lastnames":["Krstić"],"firstnames":["S."],"suffixes":[]},{"propositions":[],"lastnames":["Yang"],"firstnames":["J."],"suffixes":[]},{"propositions":[],"lastnames":["Palmer"],"firstnames":["D.","W."],"suffixes":[]},{"propositions":[],"lastnames":["Osborne"],"firstnames":["R.","B."],"suffixes":[]},{"propositions":[],"lastnames":["Talmor"],"firstnames":["E."],"suffixes":[]}],"month":"May","year":"2014","keywords":"#broken, Authentication, Hardware, IP blocks, IP networks, Jab/#HOST, Load modeling, Protocols, SoC firmware load protocol security, System-on-chip, cryptographic protocols, firmware, security architecture, security sensitive firmware load protocols, system-on-chip, systems-on-a-chip, tool-supported specification, validation technology","pages":"70–75","bibtex":"@inproceedings{krstic_security_2014,\n\ttitle = {Security of {SoC} firmware load protocols},\n\tdoi = {10.1109/HST.2014.6855571},\n\tabstract = {The security architecture of modern systems-on-a-chip (SoC) is complex and critical to be done right and quickly. SoC security architects feel an acute need for new tool-supported specification and validation technologies. Aiming to stimulate research into creation of these technologies, in this paper we provide some industrial insights and initial solutions. Focusing on a concrete non-trivial example of security sensitive firmware load protocols, we show how to: (1) concisely specify the communication between IP blocks; (2) model the adversary; (3) debug and verify the protocol.},\n\tbooktitle = {2014 {IEEE} {International} {Symposium} on {Hardware}-{Oriented} {Security} and {Trust} ({HOST})},\n\tauthor = {Krstić, S. and Yang, J. and Palmer, D. W. and Osborne, R. B. and Talmor, E.},\n\tmonth = may,\n\tyear = {2014},\n\tkeywords = {\\#broken, Authentication, Hardware, IP blocks, IP networks, Jab/\\#HOST, Load modeling, Protocols, SoC firmware load protocol security, System-on-chip, cryptographic protocols, firmware, security architecture, security sensitive firmware load protocols, system-on-chip, systems-on-a-chip, tool-supported specification, validation technology},\n\tpages = {70--75},\n}\n\n\n\n","author_short":["Krstić, S.","Yang, J.","Palmer, D. W.","Osborne, R. B.","Talmor, E."],"key":"krstic_security_2014","id":"krstic_security_2014","bibbaseid":"krsti-yang-palmer-osborne-talmor-securityofsocfirmwareloadprotocols-2014","role":"author","urls":{},"keyword":["#broken","Authentication","Hardware","IP blocks","IP networks","Jab/#HOST","Load modeling","Protocols","SoC firmware load protocol security","System-on-chip","cryptographic protocols","firmware","security architecture","security sensitive firmware load protocols","system-on-chip","systems-on-a-chip","tool-supported specification","validation technology"],"metadata":{"authorlinks":{}},"html":""},"bibtype":"inproceedings","biburl":"https://bibbase.org/zotero/bxt101","dataSources":["Wsv2bQ4jPuc7qme8R"],"keywords":["#broken","authentication","hardware","ip blocks","ip networks","jab/#host","load modeling","protocols","soc firmware load protocol security","system-on-chip","cryptographic protocols","firmware","security architecture","security sensitive firmware load protocols","system-on-chip","systems-on-a-chip","tool-supported specification","validation technology"],"search_terms":["security","soc","firmware","load","protocols","krstić","yang","palmer","osborne","talmor"],"title":"Security of SoC firmware load protocols","year":2014}