Solver-Aided Constant-Time Hardware Verification

Klaus von Gleissenthall, Rami Gökhan Klcl, Deian Stefan, Ranjit Jhala

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

We present Xenon, a solver-aided, interactive method for formally verifying that Verilog hardware executes in constant-time. Xenon scales to realistic hardware designs by drastically reducing the effort needed to localize the root cause of verification failures via a new notion of constant-time counterexamples, which Xenon uses to synthesize a minimal set of secrecy assumptions in an interactive verification loop. To reduce verification time Xenon exploits modularity in Verilog code via module summaries, thereby avoiding duplicate work across multiple module instantiations. We show how Xenon's assumption synthesis and summaries enable us to verify different kinds of circuits, including a highly modular AES- 256 implementation where modularity cuts verification from six hours to under three seconds, and the ScarVside-channel hardened RISC-V micro-controller whose size exceeds previously verified designs by an order of magnitude. In a small study, we also find that Xenon helps non-expert users complete verification tasks correctly and faster than previous state-of-art tools.

Original languageEnglish
Title of host publicationCCS 2021
Subtitle of host publicationProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security
PublisherAssociation for Computing Machinery
Pages429-444
Number of pages16
ISBN (Electronic)9781450384544
DOIs
Publication statusPublished - Nov 2021
Event27th ACM Annual Conference on Computer and Communication Security, CCS 2021 - Virtual, Online, Korea, Republic of
Duration: 15 Nov 202119 Nov 2021

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
Volume2021
ISSN (Print)1543-7221

Conference

Conference27th ACM Annual Conference on Computer and Communication Security, CCS 2021
Country/TerritoryKorea, Republic of
CityVirtual, Online
Period15/11/2119/11/21

Bibliographical note

Funding Information:
We thank the reviewers for their suggestions and insightful comments, and our our user study participants for their effort and feedback on Xenon. This work was supported in part by the NSF under Grant Number CNS-1514435, CCF-1918573, and CAREER CNS-2048262; by ONR Grant N000141512750; and, by the CONIX Research Center, one of six centers in JUMP, a Semiconductor Research Corporation (SRC) program sponsored by DARPA.

Publisher Copyright:
© 2021 Owner/Author.

Funding

We thank the reviewers for their suggestions and insightful comments, and our our user study participants for their effort and feedback on Xenon. This work was supported in part by the NSF under Grant Number CNS-1514435, CCF-1918573, and CAREER CNS-2048262; by ONR Grant N000141512750; and, by the CONIX Research Center, one of six centers in JUMP, a Semiconductor Research Corporation (SRC) program sponsored by DARPA.

FundersFunder number
Semiconductor Research Corporation
CONIX Research Center
Defense Advanced Research Projects Agency
Not addedCNS-2048262, 1918573, 1514435, CNS-1514435, CCF-1918573
Fundação para a Ciência e a TecnologiaPTDC/CCI-BIO/29266/2017
Office of Naval ResearchN000141512750

    Keywords

    • constant-time
    • hardware
    • side-channels
    • verification

    Fingerprint

    Dive into the research topics of 'Solver-Aided Constant-Time Hardware Verification'. Together they form a unique fingerprint.

    Cite this