IMDEA Software

Iniciativa IMDEA

Inicio > Eventos > Charlas Invitadas > 2023 > Verifying Hardware Security Modules with Information-Preserving Refinement
Esta página aún no ha sido traducida. A continuación se muestra la página en inglés.

Anish Athalye

lunes 30 de octubre de 2023

11:00am 302-Mountain View and Zoom4 (https://zoom.us/j/4911012202, password:@s3)

Anish Athalye, PhD Student, MIT

Verifying Hardware Security Modules with Information-Preserving Refinement

Abstract:

Knox is a new framework that enables developers to build hardware security modules (HSMs) with high assurance through formal verification. The goal is to rule out all hardware bugs, software bugs, and timing side channels. Knox’s approach is to relate an implementation’s wire-level behavior to a functional specification stated in terms of method calls and return values with a new definition called information-preserving refinement (IPR). This definition captures the notion that the HSM implements its functional specification, and that it leaks no additional information through its wire-level behavior. The Knox framework provides support for writing specifications, importing HSM implementations written in Verilog and C code, and proving IPR using a combination of lightweight annotations and interactive proofs. To evaluate the IPR definition and the Knox framework, we verified three simple HSMs, including an RFC 6238-compliant TOTP token. The TOTP token is written in 2950 lines of Verilog and 360 lines of C and assembly. Its behavior is captured in a succinct specification: aside from the definition of the TOTP algorithm, the spec is only 10 lines of code. In all three case studies, verification covers entire hardware and software stacks and rules out hardware/software bugs and timing side channels.