kth.sePublications KTH
Change search
Link to record
Permanent link

Direct link
Publications (4 of 4) Show all publications
Marinaro, T., Buiras, P., Lindner, A., Guanciale, R. & Nemati, H. (2024). Beyond Over-Protection: A Targeted Approach to Spectre Mitigation and Performance Optimization. In: ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security: . Paper presented at 19th ACM Asia Conference on Computer and Communications Security, AsiaCCS 2024, July 1-5, 2024, Singapore, Singapore (pp. 203-216). Association for Computing Machinery (ACM)
Open this publication in new window or tab >>Beyond Over-Protection: A Targeted Approach to Spectre Mitigation and Performance Optimization
Show others...
2024 (English)In: ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, Association for Computing Machinery (ACM) , 2024, p. 203-216Conference paper, Published paper (Refereed)
Abstract [en]

Since the advent of Spectre attacks, researchers and practitioners have developed a range of hardware and software measures to counter transient execution attacks. A prime example of such mitigation is speculative load hardening (slh) in LLVM, which protects against leaks by tracking the speculation state and masking values during misspeculation. LLVM relies on static analysis to harden programs using slh that often results in over-protection, which incurs performance overhead. We extended an existing side-channel model validation framework, Scam-V, to check the vulnerability of programs to Spectre-PHT attacks and optimize the protection of programs using the slh approach. We illustrate the efficacy of Scam-V by first demonstrating that it can automatically identify Spectre vulnerabilities in programs, e.g., fragments of crypto-libraries. We then develop an optimization mechanism to validate the necessity of slh hardening w.r.t. the target platform. Our experiments showed that hardening introduced by LLVM in most cases could be improved when the underlying microarchitecture properties are considered.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2024
Keywords
countermeasures, hardware security, side-channel attacks, Spectre
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-351495 (URN)10.1145/3634737.3637651 (DOI)001283918100015 ()2-s2.0-85199256356 (Scopus ID)
Conference
19th ACM Asia Conference on Computer and Communications Security, AsiaCCS 2024, July 1-5, 2024, Singapore, Singapore
Note

Part of ISBN 9798400704826

QC 20241011

Available from: 2024-08-23 Created: 2024-08-23 Last updated: 2024-10-11Bibliographically approved
Guanciale, R., Baumann, C., Buiras, P., Dam, M. & Nemati, H. (2022). A Case Study in Information Flow Refinement for Low Level Systems. In: The Logic of Software. A Tasting Menu of Formal Methods: (pp. 54-79). Springer Nature
Open this publication in new window or tab >>A Case Study in Information Flow Refinement for Low Level Systems
Show others...
2022 (English)In: The Logic of Software. A Tasting Menu of Formal Methods, Springer Nature , 2022, p. 54-79Chapter in book (Other academic)
Abstract [en]

In this work we employ information-flow-aware refinement to study security properties of a separation kernel. We focus on refinements that support changes in data representation and semantics, including the addition of state variables that may induce new observational power or side channels. We leverage an epistemic approach to ignorance-preserving refinement where an abstract model is used as a specification of a system’s permitted information flows that may include the declassification of secret information. The core idea is to require that refinement steps must not induce observer knowledge that is not already available in the abstract model. In particular, we show that a simple key manager may cause information leakage via a refinement that includes cache and timing information. Finally, we show that deploying standard countermeasures against cache-based timing channels regains ignorance preservation.

Place, publisher, year, edition, pages
Springer Nature, 2022
Series
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743 ; 13360
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-318002 (URN)10.1007/978-3-031-08166-8_4 (DOI)2-s2.0-85133695692 (Scopus ID)
Note

QC 20220916

Available from: 2022-09-16 Created: 2022-09-16 Last updated: 2022-09-16Bibliographically approved
Buiras, P., Nemati, H., Lindner, A. & Guanciale, R. (2021). Validation of side-channel models via observation refinement. In: Proceedings of the Annual International Symposium on Microarchitecture, MICRO: . Paper presented at 54th Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 2021, 18 October 2021 through 22 October 2021 (pp. 578-591). Association for Computing Machinery (ACM)
Open this publication in new window or tab >>Validation of side-channel models via observation refinement
2021 (English)In: Proceedings of the Annual International Symposium on Microarchitecture, MICRO, Association for Computing Machinery (ACM) , 2021, p. 578-591Conference paper, Published paper (Refereed)
Abstract [en]

Observational models enable the analysis of information flow properties against side channels. Relational testing has been used to validate the soundness of these models by measuring the side channel on states that the model considers indistinguishable. However, unguided search can generate test states that are too similar to each other to invalidate the model. To address this we introduce observation refinement, a technique to guide the exploration of the state space to focus on hardware features of interest. We refine observational models to include fine-grained observations that characterize behavior that we want to exclude. States that yield equivalent refined observations are then ruled out, reducing the size of the space. We have extended an existing model validation framework, Scam-V, to support refinement. We have evaluated the usefulness of refinement for search guidance by analyzing cache coloring and speculative leakage in the ARMv8-A architecture. As a surprising result, we have exposed SiSCLoak, a new vulnerability linked to speculative execution in Cortex-A53.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2021
Keywords
Information flow security, Microarchitectures, Model validation, Side channels, Testing, Channel modelling, Flow properties, Information flows, Micro architectures, Observational models, On state, Side-channel, Unguided search, Security of data
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-313186 (URN)10.1145/3466752.3480130 (DOI)001118047400042 ()2-s2.0-85118897960 (Scopus ID)
Conference
54th Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 2021, 18 October 2021 through 22 October 2021
Note

QC 20220602

part of proceedings ISBN 9781450385572

Available from: 2022-06-02 Created: 2022-06-02 Last updated: 2025-12-05Bibliographically approved
Nemati, H., Buiras, P., Lindner, A., Guanciale, R. & Jacobs, S. (2020). Validation of Abstract Side-Channel Models for Computer Architectures. In: Lecture Notes in Computer Science book series: . Paper presented at CAV 2020: Computer Aided Verification, 21 July 2020 through 24 July 2020 (pp. 225-248). Springer, 1224
Open this publication in new window or tab >>Validation of Abstract Side-Channel Models for Computer Architectures
Show others...
2020 (English)In: Lecture Notes in Computer Science book series, Springer , 2020, Vol. 1224, p. 225-248Conference paper, Published paper (Refereed)
Abstract [en]

Observational models make tractable the analysis of information flow properties by providing an abstraction of side channels. We introduce a methodology and a tool, Scam-V, to validate observational models for modern computer architectures. We combine symbolic execution, relational analysis, and different program generation techniques to generate experiments and validate the models. An experiment consists of a randomly generated program together with two inputs that are observationally equivalent according to the model under the test. Validation is done by checking indistinguishability of the two inputs on real hardware by executing the program and analyzing the side channel. We have evaluated our framework by validating models that abstract the data-cache side channel of a Raspberry Pi 3 board with a processor implementing the ARMv8-A architecture. Our results show that Scam-V can identify bugs in the implementation of the models and generate test programs which invalidate the models due to hidden microarchitectural behavior.

Place, publisher, year, edition, pages
Springer, 2020
Keywords
Information flow security, Microarchitectures, Model validation, Side channels, Testing, Computer aided analysis, Program debugging, Software testing, Indistinguishability, Information flows, Observational models, Program generation, Relational analysis, Side-channel, Symbolic execution, Test program, Computer architecture
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-285360 (URN)10.1007/978-3-030-53288-8_12 (DOI)000695276000012 ()2-s2.0-85089236051 (Scopus ID)
Conference
CAV 2020: Computer Aided Verification, 21 July 2020 through 24 July 2020
Note

QC 20201201

Available from: 2020-12-01 Created: 2020-12-01 Last updated: 2024-01-10Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-4368-4196

Search in DiVA

Show all publications