Specification and Verification of Side-channel Security for Open-source Processors via Leakage Contracts

被引:1
|
作者
Wang, Zilong [1 ,4 ]
Mohr, Gideon [2 ]
von Gleissenthall, Klaus [3 ]
Reineke, Jan [2 ]
Guarnieri, Marco [1 ]
机构
[1] IMDEA Software Inst, Madrid, Spain
[2] Saarland Univ, Saarbrucken, Germany
[3] Vrije Univ Amsterdam, Amsterdam, Netherlands
[4] Univ Politecn Madrid, Madrid, Spain
基金
欧洲研究理事会;
关键词
Side channels; hardware verification; leakage contracts; FLOW;
D O I
10.1145/3576915.3623192
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Leakage contracts have recently been proposed as a new security abstraction at the Instruction Set Architecture (ISA) level. Leakage contracts aim to capture the information that processors leak through their microarchitectural implementations. However, so far, we lack a methodology to verify that a processor actually satisfies a given leakage contract. In this paper, we address this challenge by developing LEAVE, the first tool for verifying register-transfer-level (RTL) processor designs against ISA-level leakage contracts. To this end, we show how to decouple security and functional correctness concerns. LEAVE leverages this decoupling to make verification of contract satisfaction practical. To scale to realistic processor designs, LEAVE further employs inductive reasoning on relational abstractions. Using LEAVE, we precisely characterize the side-channel security guarantees of three open-source RISC-V processors, thereby obtaining the first proofs of contract satisfaction for RTL processor designs.
引用
收藏
页码:2128 / 2142
页数:15
相关论文
共 13 条
  • [1] FOBOS3: An Open-Source Platform for Side-Channel Analysis and Benchmarking
    Ferrufino, Eduardo
    Beckwith, Luke
    Abdulgadir, Abubakr
    Kaps, Jens-Peter
    PROCEEDINGS OF THE 2023 WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY, ASHES 2023, 2023, : 5 - 14
  • [2] Killing EM Side-Channel Leakage at its Source
    Das, Debayan
    Nath, Mayukh
    Ghosh, Santosh
    Sen, Shreyas
    2020 IEEE 63RD INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2020, : 1108 - 1111
  • [3] Verification of Power-based Side-channel Leakage through Simulation
    Yao, Yuan
    Schaumont, Patrick
    Van Woudenberg, Jasper
    Breunesse, Cees-Bart
    Santillan, Edgar Mateos
    Stecyk, Steve
    2020 IEEE 63RD INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2020, : 1112 - 1115
  • [4] EMShepherd: Detecting Adversarial Samples via Side-channel Leakage
    Ding, Ruyi
    Cheng Gongye
    Wang, Siyue
    Ding, Aidong Adam
    Fei, Yunsi
    PROCEEDINGS OF THE 2023 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ASIA CCS 2023, 2023, : 300 - 313
  • [5] Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition
    Guilley, Sylvain
    Heuser, Annelie
    Ming, Tang
    Rioul, Olivier
    INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATION: 10TH INTERNATIONAL CONFERENCE, SECITC 2017, 2017, 10543 : 12 - 27
  • [6] On the Unpredictability of SPICE Simulations for Side-Channel Leakage Verification of Masked Cryptographic Circuits
    Monta, Kazuki
    Nagata, Makoto
    Balasch, Josep
    Verbauwhede, Ingrid
    2023 60TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC, 2023,
  • [7] Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations
    Bronchain, Olivier
    Hendrickx, Julien M.
    Massart, Clement
    Olshevsky, Alex
    Standaert, Francois-Xavier
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT 1, 2019, 11692 : 713 - 737
  • [8] System Side-Channel Leakage Emulation for HW/SW Security Coverification of MPSoCs
    Krieg, Armin
    Grinschgl, Johannes
    Steger, Christian
    Weiss, Reinhold
    Bock, Holger
    Haid, Josef
    2012 IEEE 15TH INTERNATIONAL SYMPOSIUM ON DESIGN AND DIAGNOSTICS OF ELECTRONIC CIRCUITS & SYSTEMS (DDECS), 2012, : 139 - 144
  • [9] Side-channel countermeasures’ dissection and the limits of closed source security evaluations
    Bronchain O.
    Standaert F.-X.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (02): : 1 - 25
  • [10] Towards a metrics suite for evaluating cache side-channel vulnerability: Case studies on an open-source RISC-V processor
    Guo, Pengfei
    Yan, Yingjian
    Wang, Junjie
    Zhong, Jingxin
    Liu, Yanjiang
    Xu, Jinsong
    COMPUTERS & SECURITY, 2023, 135