Specification and Verification of Side-channel Security for Open-source Processors via Leakage Contracts. Wang, Z., Mohr, G., von Gleissenthall, K., Reineke, J., & Guarnieri, M. In CCS, 2023. Distinguished Paper Award
Specification and Verification of Side-channel Security for Open-source Processors via Leakage Contracts [pdf]Paper  abstract   bibtex   8 downloads  
Leakage contracts have recently been proposed as a new security abstraction at the Instruction Set Architecture (ISA) level. Such contracts aim to faithfully capture the information processors may leak through side effects of their microarchitectural implementations. However, so far, we lack a verification methodology to check that a processor actually satisfies a given leakage contract. In this paper, we address this problem by developing LeaVe, the first tool for verifying register-transfer-level (RTL) processor designs against ISA-level leakage contracts. To this end, we introduce a decoupling theorem that separates security and functional correctness concerns when verifying contract satisfaction. LeaVe leverages this decoupling to make verification of contract satisfaction practical. To scale to realistic processor designs LeaVe further employs inductive reasoning on relational abstractions. Using LeaVe, we precisely characterize the side-channel security guarantees provided by three open-source RISC-V processors, thereby obtaining the first contract satisfaction proofs for RTL processor designs.

Downloads: 8