Verifying Hardware Security Modules with Information-Preserving Refinement

Verifying Hardware Security Modules with Information-Preserving Refinement

USENIX via YouTube Direct link

Approach: formal verification

5 of 15

5 of 15

Approach: formal verification

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Verifying Hardware Security Modules with Information-Preserving Refinement

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 HSMs: powerful tools for securing s
  3. 3 HSMs suffer from bugs
  4. 4 Goal: HSMs without security vulnera
  5. 5 Approach: formal verification
  6. 6 Example: PIN-protected backup HS
  7. 7 How to relate implementation to spe
  8. 8 Information-preserving refinement
  9. 9 IPR: driver
  10. 10 IPR: emulator construction
  11. 11 IPR transfers security properties from spe
  12. 12 Knox framework
  13. 13 Evaluation: case studies
  14. 14 Subtle bug involving persistence and
  15. 15 Real implementations have similar c

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.