Specification and verification of side-channel security for open-source processors via leakage contracts

Z Wang, G Mohr, K von Gleissenthall… - Proceedings of the …, 2023 - dl.acm.org
Leakage contracts have recently been proposed as a new security abstraction at the
Instruction Set Architecture (ISA) level. Leakage contracts aim to capture the information that …

Hide and Seek with Spectres: Efficient discovery of speculative information leaks with random testing

O Oleksenko, M Guarnieri, B Köpf… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Attacks like Spectre abuse speculative execution, one of the key performance optimizations
of modern CPUs. Recently, several testing tools have emerged to automatically detect …

Pensieve: Microarchitectural modeling for security evaluation

Y Yang, T Bourgeat, S Lau, M Yan - Proceedings of the 50th Annual …, 2023 - dl.acm.org
Traditional modeling approaches in computer architecture aim to obtain an accurate
estimation of performance, area, and energy of a processor design. With the advent of …

Serberus: Protecting cryptographic code from spectres at compile-time

N Mosier, H Nemati, JC Mitchell… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
We present Serberus, the first comprehensive mitigation for hardening constant-time (CT)
code against Spectre attacks (involving the PHT, BTB, RSB, STL, and/or PSF speculation …

Microprofiler: Principled side-channel mitigation through microarchitectural profiling

M Bognar, H Winderix, J Van Bulck… - 2023 IEEE 8th …, 2023 - ieeexplore.ieee.org
Preventing information leakage through microarchitectural side channels is notoriously
challenging and, as a result, an important research question. Recent work has shown the …

Conjunct: Learning inductive invariants to prove unbounded instruction safety against microarchitectural timing attacks

S Dinesh, M Parthasarathy… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
The past decade has seen a deluge of microarchitectural side channels stemming from a
variety of hardware structures (the cache, branch predictor, execution ports, the TLB …

Zeroleak: Using llms for scalable and cost effective side-channel patching

MC Tol, B Sunar - arxiv preprint arxiv:2308.13062, 2023 - arxiv.org
Security critical software, eg, OpenSSL, comes with numerous side-channel leakages left
unpatched due to a lack of resources or experts. The situation will only worsen as the pace …

Modular Verification of Secure and Leakage-Free Systems: From Application Specification to Circuit-Level Implementation

A Athalye, H Corrigan-Gibbs, F Kaashoek… - Proceedings of the …, 2024 - dl.acm.org
Parfait is a framework for proving that an implementation of a hardware security module
(HSM) leaks nothing more than what is mandated by an application specification. Parfait …

Perspective: A principled framework for pliable and secure speculation in operating systems

TH Kim, D Rudo, K Zhao, ZN Zhao… - 2024 ACM/IEEE 51st …, 2024 - ieeexplore.ieee.org
Transient execution attacks present an unprecedented threat to computing systems.
Protecting the operating system (OS) is exceptionally challenging because a transient …

Architectural Mimicry: Innovative Instructions to Efficiently Address Control-Flow Leakage in Data-Oblivious Programs

H Winderix, M Bognar, J Noorman… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
The control flow of a program can often be observed through side-channel attacks. Hence,
when control flow depends on secrets, attackers can learn information about these secrets …