Projects per year
Abstract
Security verification of masked software implementations of cryptographic algorithms must account for microarchitectural side-effects of CPUs. Leakage contracts were proposed to provide a formal separation between hardware and software verification, ensuring interoperability and end-to-end security for independently verified components. However, previously proposed leakage contracts did not consider a class of ephemeral hardware effects called glitches, which leaves a considerable gap between security models and the capabilities of real-world attackers. We address this issue by extending the model for leakage contracts to account for glitches and transitions. We further present the first end-to-end verification tool for transient leakage contracts. Our hardware and software verification rely on the same contract as a single source of truth, facilitating fully machine-checked verification from the hardware gate level to the software. By allowing contracts to be written in the C programming language we make power contracts more accessible and intuitive for system-level engineers. To showcase the efficacy of our approach, we apply it to the RISC-V Ibex core. We show that it is possible to write a power contract for Ibex without any modifications to the hardware design. Using this contract, we prove end-to-end security between masked software and gate-level hardware.
Original language | English |
---|---|
Pages (from-to) | 110-132 |
Number of pages | 23 |
Journal | IACR Transactions on Cryptographic Hardware and Embedded Systems |
Volume | 2024 |
Issue number | 4 |
DOIs | |
Publication status | Published - 5 Sept 2024 |
Keywords
- hardware-software contracts
- power analysis
- verification
- Hardware-Software Contracts
- Co-Verification
- Power Analysis
ASJC Scopus subject areas
- Software
- Artificial Intelligence
- Signal Processing
- Hardware and Architecture
- Computer Networks and Communications
- Computer Graphics and Computer-Aided Design
Fingerprint
Dive into the research topics of 'Closing the Gap: Leakage Contracts for Processors with Transitions and Glitches'. Together they form a unique fingerprint.Projects
- 2 Active
-
Special Research Area (SFB) F85 Semantic and Cryptographic Foundations of Security and Privacy by Compositional Design
Mangard, S. (Co-Investigator (CoI))
1/01/23 → 31/12/26
Project: Research project
-
AWARE - Hardware-Ensured Software Security
Mangard, S. (Co-Investigator (CoI))
1/05/22 → 30/04/25
Project: Research project