Skip navigation
Please use this identifier to cite or link to this item: http://arks.princeton.edu/ark:/88435/dsp01tb09j8292
Full metadata record
DC FieldValueLanguage
dc.contributor.advisorMalik, Sharad-
dc.contributor.authorGilhooley, David-
dc.date.accessioned2017-07-24T13:13:41Z-
dc.date.available2017-07-24T13:13:41Z-
dc.date.created2017-05-08-
dc.date.issued2017-5-8-
dc.identifier.urihttp://arks.princeton.edu/ark:/88435/dsp01tb09j8292-
dc.description.abstractA system can only be considered truly secure if there exists a proof that the system meets its security specification. This is done with the use of Formal Verification tools, which can analyze systems and provide formal proofs of correctness. However, security systems are becoming larger and more complicated, making it harder to provide such proofs. These systems have also started to offload calculations to hardware modules. In the past, tools for Formal Verification were focused on proving correctness for either a hardware system or a software system. Traditional verification tools focus on a single type of system and are not equipped to handle current systems that depend heavily on interactions between hardware and software. New tools have been developed to perform verification on these systems, but the techniques are tested on small, academic systems. This thesis investigates the use of new formal verification tools on the industry-sized security program Verified Boot. Google’s Verified Boot is a secure bootloader used in the chromebook laptops. Verified Boot uses crypto- graphic functions to ensure that only Google’s code is run on the laptop. This process involves many hardware-software interactions, making it a difficult system for traditional verification techniques. In order to perform the verification, the Instruction Level Abstraction (ILA) toolchain is used to model Verified Boot’s required hardware of a SHA Accelerator and a Trusted Platform Module. The ILA toolchain allows formal models to be created from Hardware. These models are verifiably equivalent to the Hardware models and can be used in conjunction with the software verification. A formal model was created for parts of a Trusted Platform Module (TPM). Additionally, a software framework was created around Verified Boot in order to run it entirely on open sourced hardware. Finally, multiple software abstraction techniques are used in order to run Formal Verification tools on Verified Boot’s large codebase in a reasonable time. Twenty security proofs are generated from the codebase, verifying the claims originally stated by Google. Program correctness, array-bounds, and program flow are verified against all possible user inputs.en_US
dc.language.isoen_USen_US
dc.titleSecure Boot: Formal Verification of Software & Hardware in a large SoCen_US
dc.typePrinceton University Senior Theses-
pu.date.classyear2017en_US
pu.departmentElectrical Engineeringen_US
pu.pdf.coverpageSeniorThesisCoverPage-
pu.contributor.authorid960765807-
pu.contributor.advisorid010019369-
Appears in Collections:Electrical Engineering, 1932-2020

Files in This Item:
File SizeFormat 
david_gilhooley.pdf1.49 MBAdobe PDF    Request a copy


Items in Dataspace are protected by copyright, with all rights reserved, unless otherwise indicated.