May 12, 2023, 1:10 a.m. | Zilong Wang, Gideon Mohr, Klaus von Gleissenthall, Jan Reineke, Marco Guarnieri

cs.CR updates on arXiv.org arxiv.org

Leakage contracts have recently been proposed as a new security abstraction
at the Instruction Set Architecture (ISA) level. Such contracts aim to
faithfully capture the information processors may leak through side effects of
their microarchitectural implementations. However, so far, we lack a
verification methodology to check that a processor actually satisfies a given
leakage contract. In this paper, we address this problem by developing LeaVe,
the first tool for verifying register-transfer-level (RTL) processor designs
against ISA-level leakage contracts. To this …

abstraction aim architecture capture channel check information isa leak may processors security side-channel side effects verification

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Cloud Technical Solutions Engineer, Security

@ Google | Mexico City, CDMX, Mexico

Assoc Eng Equipment Engineering

@ GlobalFoundries | SGP - Woodlands

Staff Security Engineer, Cloud Infrastructure

@ Flexport | Bellevue, WA; San Francisco, CA

Software Engineer III, Google Cloud Security and Privacy

@ Google | Sunnyvale, CA, USA

Software Engineering Manager II, Infrastructure, Google Cloud Security and Privacy

@ Google | San Francisco, CA, USA; Sunnyvale, CA, USA