CheckMate: Automated Synthesis of Hardware Exploits and Security Litmus Tests
Author(s): Trippel, Caroline; Lustig, Daniel; Martonosi, Margaret
DownloadTo refer to this page use:
http://arks.princeton.edu/ark:/88435/pr11j9v
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Trippel, Caroline | - |
dc.contributor.author | Lustig, Daniel | - |
dc.contributor.author | Martonosi, Margaret | - |
dc.date.accessioned | 2021-10-08T19:45:22Z | - |
dc.date.available | 2021-10-08T19:45:22Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.citation | Trippel, Caroline, Daniel Lustig, and Margaret Martonosi. "CheckMate: Automated Synthesis of Hardware Exploits and Security Litmus Tests." 51st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO) (2018): pp. 947-960. doi:10.1109/MICRO.2018.00081 | en_US |
dc.identifier.uri | https://check.cs.princeton.edu/papers/ctrippel_MICRO51.pdf | - |
dc.identifier.uri | http://arks.princeton.edu/ark:/88435/pr11j9v | - |
dc.description.abstract | Recent research has uncovered a broad class of security vulnerabilities in which confidential data is leaked through programmer-observable microarchitectural state. In this paper, we present CheckMate, a rigorous approach and automated tool for determining if a microarchitecture is susceptible to specified classes of security exploits, and for synthesizing proof-of-concept exploit code when it is. Our approach adopts "microarchitecturally happens-before" (μhb) graphs which prior work designed to capture the subtle orderings and interleavings of hardware execution events when programs run on a microarchitecture. CheckMate extends μhb graphs to facilitate modeling of security exploit scenarios and hardware execution patterns indicative of classes of exploits. Furthermore, it leverages relational model finding techniques to enable automated exploit program synthesis from microarchitecture and exploit pattern specifications. As a case study, we use CheckMate to evaluate the susceptibility of a speculative out-of-order processor to Flush+Reload cache side-channel attacks. The automatically synthesized results are programs representative of Meltdown and Spectre attacks. We then evaluate the same processor on its susceptibility to a different timing side-channel attack: Prime+Probe. Here, CheckMate synthesized new exploits that are similar to Meltdown and Spectre in that they leverage speculative execution, but unique in that they exploit distinct microarchitectural behaviors-speculative cache line invalidations rather than speculative cache pollution-to form a side-channel. Most importantly, our results validate the CheckMate approach to formal hardware security verification and the ability of the CheckMate tool to detect real-world vulnerabilities. | en_US |
dc.format.extent | 947 - 960 | en_US |
dc.language.iso | en_US | en_US |
dc.relation.ispartof | 51st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO) | en_US |
dc.rights | Author's manuscript | en_US |
dc.title | CheckMate: Automated Synthesis of Hardware Exploits and Security Litmus Tests | en_US |
dc.type | Conference Article | en_US |
dc.identifier.doi | 10.1109/MICRO.2018.00081 | - |
pu.type.symplectic | http://www.symplectic.co.uk/publications/atom-terms/1.0/conference-proceeding | en_US |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
CheckMateHardwareExploitsSecurity.pdf | 667.88 kB | Adobe PDF | View/Download |
Items in OAR@Princeton are protected by copyright, with all rights reserved, unless otherwise indicated.