首页> 外文会议>International Conference on Codes, Cryptology and Information Security >Model Checking Speculation-Dependent Security Properties: Abstracting and Reducing Processor Models for Sound and Complete Verification
【24h】

Model Checking Speculation-Dependent Security Properties: Abstracting and Reducing Processor Models for Sound and Complete Verification

机译:模型检查与投机有关的安全性:提取和减少处理器模型以进行声音和完整验证

获取原文

摘要

Though modern microprocessors embed several hardware security mechanisms, aimed at guaranteeing confidentiality and integrity of sensible data, recently disclosed attacks such as Spectre and Meltdown witness weaknesses with potentially great impact on CPU security. Both vulnerabilities exploit speculative execution of modern high-performance micro-architectures, allowing the attacker to observe data leaked via a memory side channel, during speculated and mispredicted instructions. In this paper we present a methodology to formally verify, by means of a model checker, speculative vulnerabilities, such as the class of Spectre/Meltdown attacks, in microprocessors based on speculative execution. In detail, we discuss the problem of formally verifying confidentiality violations, since we deem it will help preventing new vulnerabilities of the same typology. We describe our methodology on a pipelined CPU inspired by the DLX RISC processor architecture. Due to scalability issues, and following related approaches in formal verification of correctness, our approach simplifies the model under verification by proper abstraction and reduction steps. The approach is based on flushing the pipeline, abstracting data and most of the speculative execution logic, keeping a subset of control data, plus speculated data state and tainting logic. Illegal propagation (data leakage) is encoded in terms of taint propagation, from a protected/invalid memory address to the address bus on a subsequent memory read, affecting the cache. We introduce the theoretical flow, relying on known theoretical results combined and exploited to prove soundness and completeness. Finally, using a state-of-the-art model checking tool, we present preliminary data on formal verification based on Bounded Model Checking, that to support our claims and highlight the feasibility of the approach.
机译:尽管现代微处理器嵌入了几种硬件安全机制,旨在保证敏感数据的机密性和完整性,但最近披露的诸如Spectre和Meltdown之类的攻击见证了一些弱点,可能会对CPU安全性产生巨大影响。这两个漏洞都利用了现代高性能微体系结构的推测执行,从而使攻击者能够在推测和错误预测的指令期间观察通过内存侧通道泄漏的数据。在本文中,我们提出了一种方法,该方法可通过模型检查器正式验证基于推测执行的微处理器中的推测漏洞,例如Spectre / Meltdown攻击的类别。详细地说,我们讨论正式验证违反保密性的问题,因为我们认为这将有助于防止相同类型的新漏洞。我们将在受DLX RISC处理器体系结构启发的流水线CPU上描述我们的方法。由于可伸缩性问题,以及在正确性的形式验证中遵循以下相关方法,我们的方法通过适当的抽象和简化步骤来简化正在验证的模型。该方法基于刷新管道,抽象数据和大多数推测执行逻辑,保留控制数据的子集以及推测数据状态和污染逻辑。非法传播(数据泄漏)按照污点传播进行编码,从受保护/无效的内存地址到后续读取的内存中的地址总线,从而影响缓存。我们介绍理论流程,并结合已知的理论结果并加以利用以证明其健全性和完整性。最后,我们使用最先进的模型检查工具,基于有界模型检查来提供有关形式验证的初步数据,以支持我们的主张并强调该方法的可行性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号