Formal Verification of Security Properties on RISC-V Processors

Hardware Security and trustworthiness are becoming ever more important, especially for security-critical applications like autonomous driving and service robots. With the increase in distribution of RISC-V processors, security issues in them arise. Security vulnerabilities and design flaws in proces...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Proceedings (ACM and IEEE International Conference on Formal Methods and Models for Co-Design) s. 159 - 168
Hlavní autoři: Chuah, Czea Sie, Appold, Christian, Leinmueller, Tim
Médium: Konferenční příspěvek
Jazyk:angličtina
Vydáno: ACM 21.09.2023
Témata:
ISSN:2832-6520
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Popis
Shrnutí:Hardware Security and trustworthiness are becoming ever more important, especially for security-critical applications like autonomous driving and service robots. With the increase in distribution of RISC-V processors, security issues in them arise. Security vulnerabilities and design flaws in processors can be exploited by attackers, e.g. by running software exploiting the vulnerabilities. This can lead to drastic consequences like damaging whole system functionality and even human lives can be endangered. Hence, it is very important to verify compliance of processors with the design specification and microarchitecture intent to harden the hardware against malicious attacks. Detection and removal of design bugs results in improved processor security. Therefore, we formally verify in this paper the security-critical functionality of a commercial RISC-V processor using model checking based formal verification with the formal verification tool Jasper. For this, we determined and implemented a comprehensive list of properties for security-critical functionality, derived from RISC-V specification and processor microarchitecture intent. The properties cover the security-critical functionality within a RISC-V processor. With our verification experiments, we detected design bugs which have been confirmed by the design team.CCS CONCEPTS*Computer systems organization \rightarrow System on a chip; Embedded systems;*Security and privacy \rightarrow Logic and verification; Embedded systems security;*Hardware \rightarrow Assertion checking; Model checking.
ISSN:2832-6520
DOI:10.1145/3610579.3611085