Teesec: Pre-silicon vulnerability discovery for trusted execution environments
Trusted execution environments (TEE) are CPU hardware extensions that provide security
guarantees for applications running on untrusted operating systems. The security of TEEs is …
guarantees for applications running on untrusted operating systems. The security of TEEs is …
RTL verification for secure speculation using contract shadow logic
Modern out-of-order processors face speculative execution attacks. Despite various
proposed software and hardware mitigations to prevent such attacks, new attacks keep …
proposed software and hardware mitigations to prevent such attacks, new attacks keep …
Security Verification of Low-Trust Architectures
Low-trust architectures work on, from the viewpoint of software, always-encrypted data, and
significantly reduce the amount of hardware trust to a small software-free enclave …
significantly reduce the amount of hardware trust to a small software-free enclave …
RTL2MμPATH: Multi-μPATH Synthesis with Applications to Hardware Security Verification
The Check tools automate formal memory consistency model and security verification of
processors by analyzing abstract models of microarchitectures, called μSPEC models …
processors by analyzing abstract models of microarchitectures, called μSPEC models …
[PDF][PDF] Cascade: CPU fuzzing via intricate program generation
Generating interesting test cases for CPU fuzzing is akin to generating programs that
exercise unusual states inside the CPU. The performance of CPU fuzzing is heavily …
exercise unusual states inside the CPU. The performance of CPU fuzzing is heavily …
[HTML][HTML] Hardware information flow tracking based on lightweight path awareness
H Sun, Z Yang, X Chen, H Xu, Z Yuan - Computers & Security, 2024 - Elsevier
Vulnerabilities and Trojans in hardware design may cause sensitive data to be leaked and
tampered. Information flow tracking technology can effectively verify the confidentiality and …
tampered. Information flow tracking technology can effectively verify the confidentiality and …
Lost and Found in Speculation: Hybrid Speculative Vulnerability Detection
Microarchitectural attacks represent a challenging and persistent threat to modern
processors, exploiting inherent design vulnerabilities in processors to leak sensitive …
processors, exploiting inherent design vulnerabilities in processors to leak sensitive …
Security Properties for Open-Source Hardware Designs
J Rogers, N Shakeel, D Mankani, S Espinosa… - arxiv preprint arxiv …, 2024 - arxiv.org
The hardware security community relies on databases of known vulnerabilities and open-
source designs to develop formal verification methods for identifying hardware security …
source designs to develop formal verification methods for identifying hardware security …
RemembERR: Leveraging Microprocessor Errata for Design Testing and Validation
Microprocessors are constantly increasing in complexity, but to remain competitive, their
design and testing cycles must be kept as short as possible. This trend inevitably leads to …
design and testing cycles must be kept as short as possible. This trend inevitably leads to …
Automated Assertion Checker Generator and Information Flow Tracking for Security Verification
MAA Zapata, A Shahshahani… - 2024 25th International …, 2024 - ieeexplore.ieee.org
The increasing complexity of designs and the emergence of hardware security
vulnerabilities pose challenges to efficient verification. This paper presents an automated …
vulnerabilities pose challenges to efficient verification. This paper presents an automated …