Specification and Verification of Strong Timing Isolation of Hardware Enclaves
Author(s)
Lau, Stella; Bourgeat, Thomas; Pit-Claudel, Cl?ment; Chlipala, Adam
Download3658644.3690203.pdf (1.845Mb)
 Publisher with Creative Commons License
Publisher with Creative Commons License
Creative Commons Attribution
Terms of use
Metadata
Show full item recordAbstract
The process isolation enforceable by commodity hardware and operating systems is too weak to protect secrets from malicious code running on the same machine: attacks exploit timing side channels derived from contention on shared microarchitectural resources to extract secrets. With appropriate hardware support, however, we can construct isolated enclaves and safeguard independent processes from interference through timing side channels, a step towards confidentiality and integrity guarantees.
In this paper, we describe our work on formally specifying and verifying that a synthesizable hardware architecture implements strong timing isolation for enclaves. We reason about the cycle-accurate semantics of circuits with respect to a trustworthy formulation of strong isolation based on "air-gapped machines" and develop a modular proof strategy that sidesteps the need to prove functional correctness of processors. We apply our method on a synthesizable, multicore, pipelined RISC-V design formalized in Coq.
Description
CCS ’24, October 14–18, 2024, Salt Lake City, UT, USA.
Date issued
2024-12-02Department
Massachusetts Institute of Technology. Department of Electrical Engineering and Computer SciencePublisher
ACM|Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security
Citation
Lau, Stella, Bourgeat, Thomas, Pit-Claudel, Cl?ment and Chlipala, Adam. 2024. "Specification and Verification of Strong Timing Isolation of Hardware Enclaves."
Version: Final published version 
ISBN
979-8-4007-0636-3
Collections
The following license files are associated with this item: