Specifying and verifying hardware for tamper-resistant software

D. Lie, J. Mitchell, C.A. Thekkath, M. Horowitz
Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405)  
We specify a hardware architecture that supports tamper-resistant software by identifying an "idealized" model, which gives the abstracted actions available to a single user program. This idealized model is compared to a concrete "actual" model that includes actions of an adversarial operating system. The architecture is verified by using a finite-state enumeration tool (a model checker) to compare executions of the idealized and actual models. In this approach, software tampering occurs if the
more » ... system can enter a state where one model is inconsistent with the other. In performing the verification, we detected an replay attack scenario and were able to verify the security of our solution to the problem. Our methods were also able to verify that all actions in the architecture are required, as well as come up with a set of constraints on the operating system to guarantee liveness for users.
doi:10.1109/secpri.2003.1199335 dblp:conf/sp/LieMTH03 fatcat:iqfq527ayvbufidkdujw6lwvie