Ordering Interventions for Hardware Security
Viansa Schmulbach
EECS Department, University of California, Berkeley
Technical Report No. UCB/EECS-2023-238
November 24, 2023
http://www2.eecs.berkeley.edu/Pubs/TechRpts/2023/EECS-2023-238.pdf
Hardware execution attacks exploit interactions in the processor microarchitecture. The goal of our research is to use formal verification tools to harden a processor implementation such that certain programs running on the processor are secure against transient execution attacks. In this paper, we formulate the task of hardening as a search problem for a minimal set of ordering constraints.
BibTeX citation:
@techreport{Schmulbach:EECS-2023-238, Author= {Schmulbach, Viansa}, Title= {Ordering Interventions for Hardware Security}, Year= {2023}, Month= {Nov}, Url= {http://www2.eecs.berkeley.edu/Pubs/TechRpts/2023/EECS-2023-238.html}, Number= {UCB/EECS-2023-238}, Abstract= {Hardware execution attacks exploit interactions in the processor microarchitecture. The goal of our research is to use formal verification tools to harden a processor implementation such that certain programs running on the processor are secure against transient execution attacks. In this paper, we formulate the task of hardening as a search problem for a minimal set of ordering constraints.}, }
EndNote citation:
%0 Report %A Schmulbach, Viansa %T Ordering Interventions for Hardware Security %I EECS Department, University of California, Berkeley %D 2023 %8 November 24 %@ UCB/EECS-2023-238 %U http://www2.eecs.berkeley.edu/Pubs/TechRpts/2023/EECS-2023-238.html %F Schmulbach:EECS-2023-238