Axiomatic Hardware-Software Contracts for Security

被引:6
|
作者
Mosier, Nicholas [1 ]
Lachnitt, Hanna [1 ]
Nemati, Hamed [1 ,2 ]
Trippel, Caroline [1 ]
机构
[1] Stanford Univ, Stanford, CA 94305 USA
[2] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
基金
美国国家科学基金会;
关键词
hardware security; side-channel attacks; hardware-software contracts; Spectre; memory consistency models; MEMORY; MODEL;
D O I
10.1145/3470496.3527412
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We propose leakage containment models (LCMs)-novel axiomatic security contracts which support formally reasoning about the security guarantees of programs when they run on particular microarchitectures. Our core contribution is an axiomatic vocabulary for formalizing LCMs, derived from the established axiomatic vocabulary for formalizing processor memory consistency models. Using this vocabulary, we formalize microarchitectural leakage-focusing on leakage through hardware memory systems-so that it can be automatically detected in programs and provide a taxonomy for classifying said leakage by severity. To illustrate the efficacy of LCMs, we first demonstrate that our leakage definition faithfully captures a sampling of (transient and non-transient) microarchitectural attacks from the literature. Second, we develop a static analysis tool based on LCMs which automatically identifies Spectre vulnerabilities in programs and scales to analyze real-world crypto-libraries.
引用
收藏
页码:72 / 86
页数:15
相关论文
共 50 条
  • [1] A Framework for Testing Hardware-Software Security Architectures
    Dwoskin, Jeffrey S.
    Gomathisankaran, Mahadevan
    Chen, Yu-Yuan
    Lee, Ruby B.
    26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), 2010, : 387 - 397
  • [2] From Hardware-Software Contracts to Industrial IoT-Cloud Block-chains for Security
    Bakoyiannis, Dimitrios
    Tomoutzoglou, Othon
    Kornaros, George
    Coppola, Marcello
    2021 SMART SYSTEMS INTEGRATION (SSI), 2021,
  • [3] Bluetooth security design based on software oriented hardware-software partition
    Lee, G
    Park, SC
    5TH WORLD WIRELESS CONGRESS, PROCEEDINGS, 2004, : 157 - 160
  • [4] Bluetooth security implementation based on software oriented hardware-software partition
    Lee, G
    Park, SC
    ICC 2005: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, 2005, : 2070 - 2074
  • [5] Hardware-software codesign
    Hoover, C
    Martin, G
    IEEE SPECTRUM, 1996, 33 (11) : 40 - 41
  • [6] HARDWARE-SOFTWARE TRADEOFF
    不详
    MINI-MICRO SYSTEMS, 1977, 10 (11-1): : 98 - &
  • [7] HARDWARE-SOFTWARE INTERACTION
    BROWN, PTS
    DATA PROCESSING, 1973, 15 (02): : 125 - 129
  • [8] HARDWARE-SOFTWARE COMPLEMENTARITY
    OETTINGE.AC
    COMMUNICATIONS OF THE ACM, 1967, 10 (10) : 604 - &
  • [9] Hardware-software codesign
    Cuomo, A
    De Micheli, G
    Ernst, R
    Fuchs, M
    Gajski, DD
    Jerraya, A
    Sangiovanni-Vincentelli, A
    Sciuto, D
    Vissers, KA
    IEEE DESIGN & TEST OF COMPUTERS, 2000, 17 (01): : 92 - 99
  • [10] The Hardware-Software Tango
    Prasad, K. Venkatesh
    PROCEEDINGS OF THE IEEE, 2009, 97 (07) : 1159 - 1160