Verifying Hardware Security Modules with Information-Preserving Refinement

Verifying Hardware Security Modules with Information-Preserving Refinement

USENIX via YouTube Direct link

IPR transfers security properties from spe

11 of 15

11 of 15

IPR transfers security properties from spe

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Verifying Hardware Security Modules with Information-Preserving Refinement

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 HSMs: powerful tools for securing s
  3. 3 HSMs suffer from bugs
  4. 4 Goal: HSMs without security vulnera
  5. 5 Approach: formal verification
  6. 6 Example: PIN-protected backup HS
  7. 7 How to relate implementation to spe
  8. 8 Information-preserving refinement
  9. 9 IPR: driver
  10. 10 IPR: emulator construction
  11. 11 IPR transfers security properties from spe
  12. 12 Knox framework
  13. 13 Evaluation: case studies
  14. 14 Subtle bug involving persistence and
  15. 15 Real implementations have similar c

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.