A Formal Approach to Secure Speculation

被引:40
作者
Cheang, Kevin [1 ]
Rasmussen, Cameron [1 ]
Seshia, Sanjit [1 ]
Subramanyan, Pramod [2 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
[2] Indian Inst Technol, Kanpur, Uttar Pradesh, India
来源
2019 IEEE 32ND COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2019) | 2019年
关键词
SIDE-CHANNEL COUNTERMEASURES; INFORMATION-FLOW; DETERMINISM;
D O I
10.1109/CSF.2019.00027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Transient execution attacks like Spectre, Meltdown and Foreshadow have shown that combinations of microarchitectural side-channels can be exploited to create side-channel leaks that are greater than the sum of their parts. While both hardware and software mitigations have been proposed against these attacks, provable security has remained elusive. This paper introduces a formal methodology for enabling secure speculative execution on modern processors. We propose a new class of information flow security properties called trace property-dependent observational determinism (TPOD). We use this class to formulate a secure speculation property. Our property formulation and associated adversary models help formalize the class of transient execution vulnerabilities. We demonstrate applicability of our methodology by verifying secure speculation for several illustrative programs.
引用
收藏
页码:288 / 303
页数:16
相关论文
共 73 条
[1]  
ABADI M, 2005, ACM T INFORM SYST SE, V5, P340, DOI [DOI 10.1145/1102120.1102165, DOI 10.1145/1609956.1609960]
[2]  
Aciiçmez O, 2007, LECT NOTES COMPUT SC, V4377, P225
[3]  
Almeida JB, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P53
[4]   Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBC [J].
Almeida, Jose Bacelar ;
Barbosa, Manuel ;
Barthe, Gilles ;
Dupressoir, Francois .
FAST SOFTWARE ENCRYPTION (FSE 2016), 2016, 9783 :163-184
[5]  
[Anonymous], 2018, Spectre mitigations in msvc
[6]  
[Anonymous], 2016, ARXIV PREPRINT ARXIV
[7]  
[Anonymous], 2014, P 20 INT C TOOLS ALG
[8]   Formal verification of side-channel countermeasures using self-composition [J].
Bacelar Almeida, J. ;
Barbosa, Manuel ;
Pinto, Jorge S. ;
Vieira, Barbara .
SCIENCE OF COMPUTER PROGRAMMING, 2013, 78 (07) :796-812
[9]   Secure information flow by self-composition [J].
Barthe, G ;
D'Argenio, PR ;
Rezk, T .
17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2004, :100-114
[10]   Secure compilation of side-channel countermeasures: the case of cryptographic "constant-time" [J].
Barthe, Gilles ;
Gregoire, Benjamin ;
Laporte, Vincent .
IEEE 31ST COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2018), 2018, :328-343