Tool-supported dataflow analysis of a security-critical embedded device


Autoria(s): Mills, Chris; Fidge, Colin J.; Corney, Diane
Contribuinte(s)

Pieprzyk, Josef

Thomborson, Clark

Data(s)

30/01/2012

Resumo

Defence organisations perform information security evaluations to confirm that electronic communications devices are safe to use in security-critical situations. Such evaluations include tracing all possible dataflow paths through the device, but this process is tedious and error-prone, so automated reachability analysis tools are needed to make security evaluations faster and more accurate. Previous research has produced a tool, SIFA, for dataflow analysis of basic digital circuitry, but it cannot analyse dataflow through microprocessors embedded within the circuit since this depends on the software they run. We have developed a static analysis tool that produces SIFA compatible dataflow graphs from embedded microcontroller programs written in C. In this paper we present a case study which shows how this new capability supports combined hardware and software dataflow analyses of a security critical communications device.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/47261/

Publicador

Australian Computer Society

Relação

http://eprints.qut.edu.au/47261/1/MillsFidgeCorney.pdf

http://web.science.mq.edu.au/conferences/aisc2012/

Mills, Chris, Fidge, Colin J., & Corney, Diane (2012) Tool-supported dataflow analysis of a security-critical embedded device. In Pieprzyk, Josef & Thomborson, Clark (Eds.) Proceedings of the 10th Australasian Information Security Conference (AISC 2012), Australian Computer Society, RMIT University, Melbourne, VIC, pp. 59-70.

http://purl.org/au-research/grants/ARC/LP0776344

Direitos

Copyright 2012 Australian Computer Society

Copyright 2012, Australian Computer Society, Inc. This paper appeared at the Tenth Australasian Information Security Conference (AISC2012), Melbourne, Australia, 30th January– 2nd February 2012. Conferences in Research and Practice in Information Technology (CRPIT), Vol. 125, J. Pieprzyk and C. Thomborson, Ed. Reproduction for academic, not-for-profit purposes permitted provided this text is included.

Fonte

Faculty of Science and Technology; Information Security Institute

Palavras-Chave #080303 Computer System Security #Information security evaluation #Dataflow analysis #Static analysis #Embedded devices
Tipo

Conference Paper