Please use this identifier to cite or link to this item:
http://arks.princeton.edu/ark:/88435/dsp01cf95jd89c
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor | Gupta, Aarti | - |
dc.contributor.advisor | Malik, Sharad | - |
dc.contributor.author | Chou, Elaine | - |
dc.date.accessioned | 2016-06-22T15:43:11Z | - |
dc.date.available | 2016-06-22T15:43:11Z | - |
dc.date.created | 2016-05-02 | - |
dc.date.issued | 2016-06-22 | - |
dc.identifier.uri | http://arks.princeton.edu/ark:/88435/dsp01cf95jd89c | - |
dc.description.abstract | The of completeness formal verification that provides either a proof of correctness to determine that a checked property holds, or a counterexample that is in violation, is a valu- able asset to security verification, which requires comprehensive testing of all corner cases. While there has been increasing use of model checking as a means of verifying hardware and software separately, unified hardware and software analysis tools are less developed. As integrated circuits become more complex, the prevalence of system-on-chip (SoC) designs with a programmable core that runs rmware to control and interact with hardware accel- erators and other peripheral devices presents a growing need for reliable hardware- rmware coverification. In pursuit of the goal of developing a tool for model checking across the hardware- rmware boundary that is scalable and efficient, we build a realistic testing infras- tructure that can demonstrate the effectiveness of the models that are in development. This task involves adding hardware accelerators to a 8051 microcontroller to create a substantial hardware- rmware interface, developing a secure bootloader that makes use of interactions between hardware and rmware, and identifying system properties of the secure bootloader that cross the hardware- rmware divide and verifying them with formal methods. A subset of these secure boot properties cannot be expressed with temporal logics, so we explore two proposed languages that address this challenge. To perform verification, we abstract the hardware into software, substituting uninterpreted functions in place of complex operations whose details do not affect the properties being checked. | en_US |
dc.format.extent | 52 pages | en_US |
dc.language.iso | en_US | en_US |
dc.title | A Secure Bootloader for Demonstrating Formal Verification of Hardware-Firmware Interactions on SoCs | en_US |
dc.type | Princeton University Senior Theses | - |
pu.date.classyear | 2016 | en_US |
pu.department | Electrical Engineering | en_US |
pu.pdf.coverpage | SeniorThesisCoverPage | - |
Appears in Collections: | Electrical Engineering, 1932-2020 |
Files in This Item:
File | Size | Format | |
---|---|---|---|
chou_Elaine_seniorthesis.pdf | 1.2 MB | Adobe PDF | Request a copy |
Items in Dataspace are protected by copyright, with all rights reserved, unless otherwise indicated.