Chinese Journal of Network and Information Security ›› 2016, Vol. 2 ›› Issue (7): 59-68.doi: 10.11959/j.issn.2096-109x.2016.00071

• Academic paper • Previous Articles     Next Articles

Firmware vulnerability analysis based on formal verification of software and hardware

Peng-hui ZHANG(),Xi TIAN,Kang-wei LOU   

  1. School of Electronic Science and Engineering,National University of Defense Technology,Changsha 410003,China
  • Revised:2016-06-27 Online:2016-07-15 Published:2020-03-26
  • Supported by:
    The National High Technology Research and Development Program(2015AA2557)

Abstract:

In order to analyze the potential vulnerabilities in the firmware systematically and effectively,a formal verification method based on TLA,in a collaborated form of software and hardware was proposed.With this method,the interaction mechanism of software and hardware in the computer boot process was modeled and analyzed.By adjusting the attack model,a secure vulnerability in the update process of the firmware was found,and its existence by an experiment,which proved the reliability of formal verification was demonstrated.

Key words: firmware security, TLA, formal verification, vulnerability analysis, software and hardware collaboration

CLC Number: 

No Suggested Reading articles found!