Главная
Study mode:
on
1
Intro
2
HSMs: powerful tools for securing s
3
HSMs suffer from bugs
4
Goal: HSMs without security vulnera
5
Approach: formal verification
6
Example: PIN-protected backup HS
7
How to relate implementation to spe
8
Information-preserving refinement
9
IPR: driver
10
IPR: emulator construction
11
IPR transfers security properties from spe
12
Knox framework
13
Evaluation: case studies
14
Subtle bug involving persistence and
15
Real implementations have similar c
Description:
Explore a groundbreaking framework for building highly secure hardware security modules (HSMs) through formal verification in this OSDI '22 conference talk. Dive into the Knox framework, which aims to eliminate hardware bugs, software bugs, and timing side channels in HSMs. Learn about the novel concept of information-preserving refinement (IPR) and how it relates an implementation's wire-level behavior to a functional specification. Discover the framework's support for writing specifications, importing Verilog and C code implementations, and proving IPR using annotations and interactive proofs. Examine three case studies, including an RFC 6238-compliant TOTP token, to understand how verification covers entire hardware and software stacks. Gain insights into the challenges and benefits of creating HSMs with high assurance, and explore the potential impact on the future of hardware security.

Verifying Hardware Security Modules with Information-Preserving Refinement

USENIX
Add to list
0:00 / 0:00