A formal methodology for verifying side-channel vulnerabilities in cache architectures

Security-aware CPU caches have been designed to mitigate side-channel attacks and prevent information leakage. How to validate the effectiveness of these designs remains an unsolved problem. Prior works assess the security of architectures empirically without a formal guarantee, making the evaluatio...

Full description

Saved in:
Bibliographic Details
Main Authors: Jiang, Ke, Zhang, Tianwei, Sanan, David, Zhao, Yongwang, Liu, Yang
Other Authors: School of Computer Science and Engineering
Format: Conference or Workshop Item
Language:English
Published: 2023
Subjects:
Online Access:https://hdl.handle.net/10356/165417
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-165417
record_format dspace
spelling sg-ntu-dr.10356-1654172023-03-31T15:49:49Z A formal methodology for verifying side-channel vulnerabilities in cache architectures Jiang, Ke Zhang, Tianwei Sanan, David Zhao, Yongwang Liu, Yang School of Computer Science and Engineering 23rd International Conference on Formal Engineering Methods (ICFEM 2022) Engineering::Computer science and engineering Cache Designs Side-Channel Attacks Security Verification Security-aware CPU caches have been designed to mitigate side-channel attacks and prevent information leakage. How to validate the effectiveness of these designs remains an unsolved problem. Prior works assess the security of architectures empirically without a formal guarantee, making the evaluation results less convincing. In this paper, we propose a comprehensive methodology based on formal methods for security verification of cache architectures. Specifically, we design an entropy-based noninterference reasoning framework with two unwinding conditions to assess the information leakage of the cache designs. The reasoning framework quantifies the dependency relationships by the mutual information between the distributions of input and output of side channels. Given a cache design, we formalize its behavior specification along with the cache layouts into an abstract state machine, to instantiate the parameterized reasoning framework that discloses any potential vulnerabilities. We use our methodology to assess eight state-of-the-art cache architectures to demonstrate reliability as well as flexibility. Ministry of Education (MOE) Nanyang Technological University National Research Foundation (NRF) Submitted/Accepted version This work has been supported in part by Singapore National Research Founda- tion under its National Cybersecurity R&D Programme (NCR Award NRF2018 NCR-NCR009-0001), Singapore Ministry of Education (MOE) AcRF Tier 1 RS02/19, NTU Start-up grant, and the National Natural Science Foundation of China (NSFC) under the Grant No.62132014 and by Key R&D Program of Zhejiang Province under the Grant No.62132014. 2023-03-28T06:09:58Z 2023-03-28T06:09:58Z 2022 Conference Paper Jiang, K., Zhang, T., Sanan, D., Zhao, Y. & Liu, Y. (2022). A formal methodology for verifying side-channel vulnerabilities in cache architectures. 23rd International Conference on Formal Engineering Methods (ICFEM 2022), 13478, 190-208. https://dx.doi.org/10.1007/978-3-031-17244-1_12 978-3-031-17243-4 https://hdl.handle.net/10356/165417 10.1007/978-3-031-17244-1_12 13478 190 208 en NRF2018 NCR-NCR009-0001 RS02/19 NTU-SUG © 2022 Springer Nature Switzerland AG. All rights reserved. This is a post-peer-review, pre-copyedit version of an article published in Proceedings of 23rd International Conference on Formal Engineering Methods (ICFEM 2022). The final authenticated version is available online at: https://doi.org/10.1007/978-3-031-17244-1_12. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Computer science and engineering
Cache Designs
Side-Channel Attacks
Security Verification
spellingShingle Engineering::Computer science and engineering
Cache Designs
Side-Channel Attacks
Security Verification
Jiang, Ke
Zhang, Tianwei
Sanan, David
Zhao, Yongwang
Liu, Yang
A formal methodology for verifying side-channel vulnerabilities in cache architectures
description Security-aware CPU caches have been designed to mitigate side-channel attacks and prevent information leakage. How to validate the effectiveness of these designs remains an unsolved problem. Prior works assess the security of architectures empirically without a formal guarantee, making the evaluation results less convincing. In this paper, we propose a comprehensive methodology based on formal methods for security verification of cache architectures. Specifically, we design an entropy-based noninterference reasoning framework with two unwinding conditions to assess the information leakage of the cache designs. The reasoning framework quantifies the dependency relationships by the mutual information between the distributions of input and output of side channels. Given a cache design, we formalize its behavior specification along with the cache layouts into an abstract state machine, to instantiate the parameterized reasoning framework that discloses any potential vulnerabilities. We use our methodology to assess eight state-of-the-art cache architectures to demonstrate reliability as well as flexibility.
author2 School of Computer Science and Engineering
author_facet School of Computer Science and Engineering
Jiang, Ke
Zhang, Tianwei
Sanan, David
Zhao, Yongwang
Liu, Yang
format Conference or Workshop Item
author Jiang, Ke
Zhang, Tianwei
Sanan, David
Zhao, Yongwang
Liu, Yang
author_sort Jiang, Ke
title A formal methodology for verifying side-channel vulnerabilities in cache architectures
title_short A formal methodology for verifying side-channel vulnerabilities in cache architectures
title_full A formal methodology for verifying side-channel vulnerabilities in cache architectures
title_fullStr A formal methodology for verifying side-channel vulnerabilities in cache architectures
title_full_unstemmed A formal methodology for verifying side-channel vulnerabilities in cache architectures
title_sort formal methodology for verifying side-channel vulnerabilities in cache architectures
publishDate 2023
url https://hdl.handle.net/10356/165417
_version_ 1762031110991118336