Transient-execution attacks: A computer architect perspective

L Fiolhais, L Sousa - ACM Computing Surveys, 2023 - dl.acm.org
Computer architects employ a series of performance optimizations at the micro-architecture
level. These optimizations are meant to be invisible to the programmer but they are implicitly …

Specification and verification of side-channel security for open-source processors via leakage contracts

Z Wang, G Mohr, K von Gleissenthall… - Proceedings of the …, 2023 - dl.acm.org
Leakage contracts have recently been proposed as a new security abstraction at the
Instruction Set Architecture (ISA) level. Leakage contracts aim to capture the information that …

Pensieve: Microarchitectural modeling for security evaluation

Y Yang, T Bourgeat, S Lau, M Yan - Proceedings of the 50th Annual …, 2023 - dl.acm.org
Traditional modeling approaches in computer architecture aim to obtain an accurate
estimation of performance, area, and energy of a processor design. With the advent of …

Design of Access Control Mechanisms in {Systems-on-Chip} with Formal Integrity Guarantees

D Mehmedagić, MR Fadiheh, J Müller… - 32nd USENIX Security …, 2023 - usenix.org
Many SoCs employ system-level hardware access control mechanisms to ensure that
security-critical operations cannot be tampered with by less trusted components of the …

RTL verification for secure speculation using contract shadow logic

Q Tan, Y Yang, T Bourgeat, S Malik, M Yan - arxiv preprint arxiv …, 2024 - arxiv.org
Modern out-of-order processors face speculative execution attacks. Despite various
proposed software and hardware mitigations to prevent such attacks, new attacks keep …

Towards a formally verified hardware root-of-trust for data-oblivious computing

L Deutschmann, J Müller, MR Fadiheh… - Proceedings of the 59th …, 2022 - dl.acm.org
The importance of preventing microarchitectural timing side channels in security-critical
applications has surged immensely over the last several years. Constant-time programming …

Specverilog: Adapting information flow control for secure speculation

D Zagieboylo, C Sherk, AC Myers, GE Suh - Proceedings of the 2023 …, 2023 - dl.acm.org
To address transient execution vulnerabilities, processor architects have proposed both
defensive designs and formal descriptions of the security they provide. However, these …

[PDF][PDF] Phantom Trails: Practical Pre-Silicon Discovery of Transient Data Leaks

A de Faveri Tron, R Isemann, H Ragab… - USENIX …, 2025 - download.vusec.net
Transient execution vulnerabilities have affected CPUs for the better part of the decade, yet,
we are still missing methods to efficiently uncover them at the design stage. Existing …

[PDF][PDF] H-Houdini: Scalable Invariant Learning

S Dinesh, Y Zhu, CW Fletcher - Proceedings of the 30th ACM …, 2025 - sushant94.me
Formal verification is a critical task in hardware design today. Yet, while there has been
significant progress in improving technique automation and efficiency, scaling to large …

VeriCHERI: Exhaustive Formal Security Verification of CHERI at the RTL

ALD Antón, J Müller, P Schmitz, T Jauch… - arxiv preprint arxiv …, 2024 - arxiv.org
Protecting data in memory from attackers continues to be a concern in computing systems.
CHERI is a promising approach to achieve such protection, by providing and enforcing fine …