Tool-supported dataflow analysis of a security-critical embedded device
Contribuinte(s) |
Pieprzyk, Josef Thomborson, Clark |
---|---|
Data(s) |
30/01/2012
|
Resumo |
Defence organisations perform information security evaluations to confirm that electronic communications devices are safe to use in security-critical situations. Such evaluations include tracing all possible dataflow paths through the device, but this process is tedious and error-prone, so automated reachability analysis tools are needed to make security evaluations faster and more accurate. Previous research has produced a tool, SIFA, for dataflow analysis of basic digital circuitry, but it cannot analyse dataflow through microprocessors embedded within the circuit since this depends on the software they run. We have developed a static analysis tool that produces SIFA compatible dataflow graphs from embedded microcontroller programs written in C. In this paper we present a case study which shows how this new capability supports combined hardware and software dataflow analyses of a security critical communications device. |
Formato |
application/pdf |
Identificador | |
Publicador |
Australian Computer Society |
Relação |
http://eprints.qut.edu.au/47261/1/MillsFidgeCorney.pdf http://web.science.mq.edu.au/conferences/aisc2012/ Mills, Chris, Fidge, Colin J., & Corney, Diane (2012) Tool-supported dataflow analysis of a security-critical embedded device. In Pieprzyk, Josef & Thomborson, Clark (Eds.) Proceedings of the 10th Australasian Information Security Conference (AISC 2012), Australian Computer Society, RMIT University, Melbourne, VIC, pp. 59-70. http://purl.org/au-research/grants/ARC/LP0776344 |
Direitos |
Copyright 2012 Australian Computer Society Copyright 2012, Australian Computer Society, Inc. This paper appeared at the Tenth Australasian Information Security Conference (AISC2012), Melbourne, Australia, 30th January– 2nd February 2012. Conferences in Research and Practice in Information Technology (CRPIT), Vol. 125, J. Pieprzyk and C. Thomborson, Ed. Reproduction for academic, not-for-profit purposes permitted provided this text is included. |
Fonte |
Faculty of Science and Technology; Information Security Institute |
Palavras-Chave | #080303 Computer System Security #Information security evaluation #Dataflow analysis #Static analysis #Embedded devices |
Tipo |
Conference Paper |