Formally Verifying a Rollback-Prevention Protocol for TEEs

被引:0
作者
Wang, Weili [1 ,2 ]
Niu, Jianyu [1 ,2 ]
Reiter, Michael K. [3 ]
Zhang, Yinqian [1 ,2 ]
机构
[1] Southern Univ Sci & Technol, Res Inst Trustworthy Autonomous Syst, Shenzhen, Peoples R China
[2] Southern Univ Sci & Technol, Dept Comp Sci & Engn, Shenzhen, Peoples R China
[3] Duke Univ, Durham, NC USA
来源
FORMAL TECHNIQUES FOR DISTRIBUTED OBJECTS, COMPONENTS, AND SYSTEMS, FORTE 2024 | 2024年 / 14678卷
基金
国家重点研发计划;
关键词
Formal verification; Rollback attacks; Trusted execution environments (TEEs); MODEL CHECKING; VERIFICATION;
D O I
10.1007/978-3-031-62645-6_9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Formal verification of distributed protocols is challenging and usually requires great human effort. Ivy, a state-of-the-art formal verification tool for modeling and verifying distributed protocols, automates this tedious process by leveraging a decidable fragment of firstorder logic. Observing the successful adoption of Ivy for verifying consensus protocols, we examine its practicality in verifying rollback-prevention protocols for Trusted Execution Environments (TEEs). TEEs suffer from rollback attacks, which can revert confidential applications' states to stale ones to compromise security. Recently, designing distributed protocols to prevent rollback attacks has attracted significant attention. However, the lack of formal verification of these protocols leaves them potentially vulnerable to security breaches. In this paper, we leverage Ivy to formally verify a rollback-prevention protocol, namely the TIKS protocol in ENGRAFT (Wang et al., CCS 2022). We select TIKS because it is similar to other rollback-prevention protocols and is self-contained. We detail the verification process of using Ivy to prove a rollback-prevention protocol, present lessons learned from this exploration, and release the proof code to facilitate future research (https://github.com/wwl020/TIKS-Proofin-Ivy). To the best of our knowledge, this is the first endeavor to explain the formal verification of a rollback-prevention protocol in detail.
引用
收藏
页码:155 / 173
页数:19
相关论文
共 40 条
  • [1] Angel S, 2023, PROCEEDINGS OF THE 17TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, OSDI 2023, P193
  • [2] [Anonymous], Errors found in distributed protocols
  • [3] [Anonymous], INTEL SOFTWARE GUARD
  • [4] [Anonymous], COQ PROOF ASSISTANT
  • [5] [Anonymous], AMD SECURE ENCRYPTED
  • [6] [Anonymous], ARM CONFIDENTIAL COM
  • [7] [Anonymous], The Tamarin Prover
  • [8] [Anonymous], Z3 SMT SOLVER
  • [9] Verification of Threshold-Based Distributed Algorithms by Decomposition to Decidable Logics
    Berkovits, Idan
    Lazic, Marijana
    Losa, Giuliano
    Padon, Oded
    Shoham, Sharon
    [J]. COMPUTER AIDED VERIFICATION, CAV 2019, PT II, 2019, 11562 : 245 - 266
  • [10] Formal Verification of Multi-Paxos for Distributed Consensus
    Chand, Saksham
    Liu, Yanhong A.
    Stoller, Scott D.
    [J]. FM 2016: FORMAL METHODS, 2016, 9995 : 119 - 136