Security Verification of Low-Trust Architectures

09/01/2023
by   Qinhan Tan, et al.
0

Low-trust architectures work on, from the viewpoint of software, always-encrypted data, and significantly reduce the amount of hardware trust to a small software-free enclave component. In this paper, we perform a complete formal verification of a specific low-trust architecture, the Sequestered Encryption (SE) architecture, to show that the design is secure against direct data disclosures and digital side channels for all possible programs. We first define the security requirements of the ISA of SE low-trust architecture. Looking upwards, this ISA serves as an abstraction of the hardware for the software, and is used to show how any program comprising these instructions cannot leak information, including through digital side channels. Looking downwards this ISA is a specification for the hardware, and is used to define the proof obligations for any RTL implementation arising from the ISA-level security requirements. These cover both functional and digital side-channel leakage. Next, we show how these proof obligations can be successfully discharged using commercial formal verification tools. We demonstrate the efficacy of our RTL security verification technique for seven different correct and buggy implementations of the SE architecture.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/22/2023

FVCARE:Formal Verification of Security Primitives in Resilient Embedded SoCs

With the increased utilization, the small embedded and IoT devices have ...
research
08/07/2022

An Enclave-based TEE for SE-in-SoC in RISC-V Industry

Secure Element (SE) in SoC sees an increasing adoption in industry. Many...
research
01/02/2018

Validation of Hardware Security and Trust: A Survey

With ever advancing in digital system, security has been emerged as a ma...
research
08/04/2023

SoftFlow: Automated HW-SW Confidentiality Verification for Embedded Processors

Despite its ever-increasing impact, security is not considered as a desi...
research
06/24/2023

LLM-assisted Generation of Hardware Assertions

The security of computer systems typically relies on a hardware root of ...
research
02/05/2022

The case for Zero Trust Digital Forensics

It is imperative for all stakeholders that digital forensics investigati...
research
06/07/2021

Towards Formal Verification of Password Generation Algorithms used in Password Managers

Password managers are important tools that enable us to use stronger pas...

Please sign up or login with your details

Forgot password? Click here to reset