@inproceedings{1e6a64ffe0b648499dd03652ada7f626,
title = "Efficient Information-Flow Verification Under Speculative Execution",
abstract = "We study the formal verification of information-flow properties in the presence of speculative execution and side-channels. First, we present a formal model of speculative execution semantics. This model can be parameterized by the depth of speculative execution and is amenable to a range of verification techniques. Second, we introduce a novel notion of information leakage under speculation, which is parameterized by the information that is available to an attacker through side-channels. Finally, we present one verification technique that uses our formalism and can be used to detect information leaks under speculation through cache side-channels, and can decide whether these are only possible under speculative execution. We implemented an instance of this verification technique that combines taint analysis and safety model checking. We evaluated this approach on a range of examples that have been proposed as benchmarks for mitigations of the Spectre vulnerability, and show that our approach correctly identifies all information leaks.",
keywords = "Information flow, Side channels, Speculative execution, Verification",
author = "Roderick Bloem and Swen Jacobs and Yakir Vizel",
note = "Publisher Copyright: {\textcopyright} 2019, Springer Nature Switzerland AG.; 17th International Symposium on Automated Technology for Verification and Analysis, ATVA 2019 ; Conference date: 28-10-2019 Through 31-10-2019",
year = "2019",
doi = "https://doi.org/10.1007/978-3-030-31784-3_29",
language = "الإنجليزيّة",
isbn = "9783030317836",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "499--514",
editor = "Yu-Fang Chen and Chih-Hong Cheng and Javier Esparza",
booktitle = "Automated Technology for Verification and Analysis- 17th International Symposium, AVTA 2019, Proceedings",
}