A Security Verification Template to Assess Cache Architecture Vulnerabilities

Conference Paper (2020)
Author(s)

Tara Ghasempouri (Tallinn University of Technology)

Jaan Raik (Tallinn University of Technology)

Kolin Paul (Tallinn University of Technology)

Cezar Reinbrecht (TU Delft - Computer Engineering)

S. Hamdioui (TU Delft - Quantum & Computer Engineering)

Mottaqiallah Taouil (TU Delft - Computer Engineering)

Research Group
Computer Engineering
Copyright
© 2020 Tara Ghasempouri, Jaan Raik, Kolin Paul, Cezar Reinbrecht, S. Hamdioui, M. Taouil
DOI related publication
https://doi.org/10.1109/DDECS50862.2020.9095707
More Info
expand_more
Publication Year
2020
Language
English
Copyright
© 2020 Tara Ghasempouri, Jaan Raik, Kolin Paul, Cezar Reinbrecht, S. Hamdioui, M. Taouil
Research Group
Computer Engineering
Pages (from-to)
1-6
ISBN (print)
978-1-7281-9939-9
ISBN (electronic)
978-1-7281-9938-2
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

In the recent years, cache based side-channel attacks have become a serious threat for computers. To face this issue, researches have been looking at verifying the security policies. However, these approaches are limited to manual security verification and they typically work for a small subset of the attacks. Hence, an effective verification environment to automatically verify the cache security for all side-channel attacks is still missing. To address this shortcoming, we propose a security verification methodology that formally verifies cache designs against cache side-channel vulnerabilities. Results show that this verification template is a straightforward, automated method in verifying cache invulnerability.

Files

License info not available