Framework for Design Validation of Security Architectures Metadata
Metadata describes a digital item, providing (if known) such information as creator, publisher, contents, size, relationship to other resources, and more. Metadata may also contain "preservation" components that help us to maintain the integrity of digital files over time.
- Main Title Framework for Design Validation of Security Architectures
Author: Dwoskin, Jeffrey Scott, 1980-Creator Type: PersonalCreator Info: Princeton University
Author: Gomathisankaran, MahadevanCreator Type: PersonalCreator Info: University of North Texas; Princeton University
Author: Lee, Ruby Bei-LohCreator Type: PersonalCreator Info: Princeton University
Name: Princeton University. Dept. of Electrical EngineeringPlace of Publication: [Princeton, New Jersey]
- Creation: 2008-11-17
- Content Description: This technical report discusses a framework for design validation of security architectures.
- Physical Description: 13 p.
- Keyword: security architectures
- Keyword: testing frameworks
- Keyword: processors
- Keyword: networked systems
Name: UNT Scholarly WorksCode: UNTSW
Name: UNT College of EngineeringCode: UNTCOE
- Rights Access: public
- Report No.: CE-L2008-013
- Archival Resource Key: ark:/67531/metadc130192
- Academic Department: Computer Science and Engineering
- Display Note: Jeffrey Dwoskin, Mahadevan Gomathisankaran, Ruby Lee. "Framework for Design Validation of Security Architectures", Princeton University Department of Electrical Engineering Technical Report CE-L2008-013, Nov 17, 2008.
- Display Note: Abstract: New security architectures are difficult to prototype and test. They require interactions between hardware, operating systems, and applications, making them hard to simulate and monitor. The authors have designed and prototyped a testing framework using a virtualization platform which emulates the behavior of new hardware security architecture in the virtual CPU, and performs a wide range of hardware and software attacks on the system under test. The authors' testing framework significantly speeds up development of the testing environment and infrastructure, and provides APIs for launching attacks and monitoring the effects of an attack on the hardware and software layers, which is especially convenient during the design and validation phases for new hardware-software architectural solutions. The authors have used this testing framework to test the trust chain of the SP architecture as an example.