Show simple item record

dc.contributor.authorTan, Qinhan
dc.contributor.authorYang, Yuheng
dc.contributor.authorBourgeat, Thomas
dc.contributor.authorMalik, Sharad
dc.contributor.authorYan, Mengjia
dc.date.accessioned2025-05-09T16:01:28Z
dc.date.available2025-05-09T16:01:28Z
dc.date.issued2025-02-03
dc.identifier.isbn979-8-4007-0698-1
dc.identifier.urihttps://hdl.handle.net/1721.1/159249
dc.descriptionASPLOS ’25, March 30–April 3, 2025, Rotterdam, Netherlandsen_US
dc.description.abstractModern out-of-order processors face speculative execution attacks. Despite various proposed software and hardware mitigations to prevent such attacks, new attacks keep arising from unknown vulnerabilities. Thus, a formal and rigorous evaluation of the ability of hardware designs to deal with speculative execution attacks is urgently desired. This paper proposes a formal verification technique called Contract Shadow Logic that can considerably improve RTL verification scalability with little manual effort while being applicable to different defense mechanisms. In this technique, we leverage computer architecture design insights to improve verification performance for checking security properties formulated as software-hardware contracts for secure speculation. Our verification scheme is accessible to computer architects and requires minimal formal-method expertise. We evaluate our technique on multiple RTL designs, including three out-of-order processors. The experimental results demonstrate that our technique exhibits a significant advantage in finding attacks on insecure designs and deriving complete proofs on secure designs, when compared to the baseline and two state-of-the-art verification schemes, LEAVE and UPEC.en_US
dc.publisherACM|Proceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 1en_US
dc.relation.isversionofhttps://doi.org/10.1145/3669940.3707243en_US
dc.rightsCreative Commons Attributionen_US
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/en_US
dc.sourceAssociation for Computing Machineryen_US
dc.titleRTL Verification for Secure Speculation Using Contract Shadow Logicen_US
dc.typeArticleen_US
dc.identifier.citationQinhan Tan, Yuheng Yang, Thomas Bourgeat, Sharad Malik, and Mengjia Yan. 2025. RTL Verification for Secure Speculation Using Contract Shadow Logic. In Proceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 1 (ASPLOS '25). Association for Computing Machinery, New York, NY, USA, 970–986.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.identifier.mitlicensePUBLISHER_CC
dc.eprint.versionFinal published versionen_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dc.date.updated2025-04-01T07:48:59Z
dc.language.rfc3066en
dc.rights.holderThe author(s)
dspace.date.submission2025-04-01T07:48:59Z
mit.licensePUBLISHER_CC
mit.metadata.statusAuthority Work and Publication Information Neededen_US


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record