Teesec: Pre-silicon vulnerability discovery for trusted execution environments

M Ghaniyoun, K Barber, Y **ao, Y Zhang… - Proceedings of the 50th …, 2023 - dl.acm.org
Trusted execution environments (TEE) are CPU hardware extensions that provide security
guarantees for applications running on untrusted operating systems. The security of TEEs is …

RTL verification for secure speculation using contract shadow logic

Q Tan, Y Yang, T Bourgeat, S Malik, M Yan - arxiv preprint arxiv …, 2024 - arxiv.org
Modern out-of-order processors face speculative execution attacks. Despite various
proposed software and hardware mitigations to prevent such attacks, new attacks keep …

Security Verification of Low-Trust Architectures

Q Tan, Y Fisseha, S Chen, L Biernacki… - Proceedings of the …, 2023 - dl.acm.org
Low-trust architectures work on, from the viewpoint of software, always-encrypted data, and
significantly reduce the amount of hardware trust to a small software-free enclave …

RTL2MμPATH: Multi-μPATH Synthesis with Applications to Hardware Security Verification

Y Hsiao, N Nikoleris, A Khyzha… - 2024 57th IEEE/ACM …, 2024 - ieeexplore.ieee.org
The Check tools automate formal memory consistency model and security verification of
processors by analyzing abstract models of microarchitectures, called μSPEC models …

[PDF][PDF] Cascade: CPU fuzzing via intricate program generation

F Solt, K Ceesay-Seitz, K Razavi - Proc. 33rd USENIX Secur. Symp, 2024 - usenix.org
Generating interesting test cases for CPU fuzzing is akin to generating programs that
exercise unusual states inside the CPU. The performance of CPU fuzzing is heavily …

[HTML][HTML] Hardware information flow tracking based on lightweight path awareness

H Sun, Z Yang, X Chen, H Xu, Z Yuan - Computers & Security, 2024 - Elsevier
Vulnerabilities and Trojans in hardware design may cause sensitive data to be leaked and
tampered. Information flow tracking technology can effectively verify the confidentiality and …

Lost and Found in Speculation: Hybrid Speculative Vulnerability Detection

M Rostami, S Zeitouni, R Kande, C Chen… - Proceedings of the 61st …, 2024 - dl.acm.org
Microarchitectural attacks represent a challenging and persistent threat to modern
processors, exploiting inherent design vulnerabilities in processors to leak sensitive …

Security Properties for Open-Source Hardware Designs

J Rogers, N Shakeel, D Mankani, S Espinosa… - arxiv preprint arxiv …, 2024 - arxiv.org
The hardware security community relies on databases of known vulnerabilities and open-
source designs to develop formal verification methods for identifying hardware security …

RemembERR: Leveraging Microprocessor Errata for Design Testing and Validation

F Solt, P Jattke, K Razavi - 2022 55th IEEE/ACM International …, 2022 - ieeexplore.ieee.org
Microprocessors are constantly increasing in complexity, but to remain competitive, their
design and testing cycles must be kept as short as possible. This trend inevitably leads to …

Automated Assertion Checker Generator and Information Flow Tracking for Security Verification

MAA Zapata, A Shahshahani… - 2024 25th International …, 2024 - ieeexplore.ieee.org
The increasing complexity of designs and the emergence of hardware security
vulnerabilities pose challenges to efficient verification. This paper presents an automated …