Please use this identifier to cite or link to this item:
http://arks.princeton.edu/ark:/88435/dsp01tb09j8292
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Malik, Sharad | - |
dc.contributor.author | Gilhooley, David | - |
dc.date.accessioned | 2017-07-24T13:13:41Z | - |
dc.date.available | 2017-07-24T13:13:41Z | - |
dc.date.created | 2017-05-08 | - |
dc.date.issued | 2017-5-8 | - |
dc.identifier.uri | http://arks.princeton.edu/ark:/88435/dsp01tb09j8292 | - |
dc.description.abstract | A system can only be considered truly secure if there exists a proof that the system meets its security specification. This is done with the use of Formal Verification tools, which can analyze systems and provide formal proofs of correctness. However, security systems are becoming larger and more complicated, making it harder to provide such proofs. These systems have also started to offload calculations to hardware modules. In the past, tools for Formal Verification were focused on proving correctness for either a hardware system or a software system. Traditional verification tools focus on a single type of system and are not equipped to handle current systems that depend heavily on interactions between hardware and software. New tools have been developed to perform verification on these systems, but the techniques are tested on small, academic systems. This thesis investigates the use of new formal verification tools on the industry-sized security program Verified Boot. Google’s Verified Boot is a secure bootloader used in the chromebook laptops. Verified Boot uses crypto- graphic functions to ensure that only Google’s code is run on the laptop. This process involves many hardware-software interactions, making it a difficult system for traditional verification techniques. In order to perform the verification, the Instruction Level Abstraction (ILA) toolchain is used to model Verified Boot’s required hardware of a SHA Accelerator and a Trusted Platform Module. The ILA toolchain allows formal models to be created from Hardware. These models are verifiably equivalent to the Hardware models and can be used in conjunction with the software verification. A formal model was created for parts of a Trusted Platform Module (TPM). Additionally, a software framework was created around Verified Boot in order to run it entirely on open sourced hardware. Finally, multiple software abstraction techniques are used in order to run Formal Verification tools on Verified Boot’s large codebase in a reasonable time. Twenty security proofs are generated from the codebase, verifying the claims originally stated by Google. Program correctness, array-bounds, and program flow are verified against all possible user inputs. | en_US |
dc.language.iso | en_US | en_US |
dc.title | Secure Boot: Formal Verification of Software & Hardware in a large SoC | en_US |
dc.type | Princeton University Senior Theses | - |
pu.date.classyear | 2017 | en_US |
pu.department | Electrical Engineering | en_US |
pu.pdf.coverpage | SeniorThesisCoverPage | - |
pu.contributor.authorid | 960765807 | - |
pu.contributor.advisorid | 010019369 | - |
Appears in Collections: | Electrical Engineering, 1932-2020 |
Files in This Item:
File | Size | Format | |
---|---|---|---|
david_gilhooley.pdf | 1.49 MB | Adobe PDF | Request a copy |
Items in Dataspace are protected by copyright, with all rights reserved, unless otherwise indicated.