Framework for Design Validation of Security Architectures Metadata

Metadata describes a digital item, providing (if known) such information as creator, publisher, contents, size, relationship to other resources, and more. Metadata may also contain "preservation" components that help us to maintain the integrity of digital files over time.


  • Main Title Framework for Design Validation of Security Architectures


  • Author: Dwoskin, Jeffrey Scott, 1980-
    Creator Type: Personal
    Creator Info: Princeton University
  • Author: Gomathisankaran, Mahadevan
    Creator Type: Personal
    Creator Info: University of North Texas; Princeton University
  • Author: Lee, Ruby Bei-Loh
    Creator Type: Personal
    Creator Info: Princeton University


  • Name: Princeton University. Dept. of Electrical Engineering
    Place of Publication: [Princeton, New Jersey]


  • Creation: 2008-11-17


  • English


  • Content Description: This technical report discusses a framework for design validation of security architectures.
  • Physical Description: 13 p.


  • Keyword: security architectures
  • Keyword: testing frameworks
  • Keyword: processors
  • Keyword: networked systems


  • Name: UNT Scholarly Works
    Code: UNTSW


  • Name: UNT College of Engineering
    Code: UNTCOE


  • Rights Access: public

Resource Type

  • Report


  • Text


  • Report No.: CE-L2008-013
  • Archival Resource Key: ark:/67531/metadc130192


  • Academic Department: Computer Science and Engineering


  • Display Note: Jeffrey Dwoskin, Mahadevan Gomathisankaran, Ruby Lee. "Framework for Design Validation of Security Architectures", Princeton University Department of Electrical Engineering Technical Report CE-L2008-013, Nov 17, 2008.
  • Display Note: Abstract: New security architectures are difficult to prototype and test. They require interactions between hardware, operating systems, and applications, making them hard to simulate and monitor. The authors have designed and prototyped a testing framework using a virtualization platform which emulates the behavior of new hardware security architecture in the virtual CPU, and performs a wide range of hardware and software attacks on the system under test. The authors' testing framework significantly speeds up development of the testing environment and infrastructure, and provides APIs for launching attacks and monitoring the effects of an attack on the hardware and software layers, which is especially convenient during the design and validation phases for new hardware-software architectural solutions. The authors have used this testing framework to test the trust chain of the SP architecture as an example.