Formal Processor Model Providing Secure Speculation For The Constant-Time Policy


A technical paper titled “ProSpeCT: Provably Secure Speculation for the Constant-Time Policy (Extended version)” was published by researchers at imec-DistriNet at KU Leuven, CEA, List, Université Paris Saclay and INRIA.


“We propose ProSpeCT, a generic formal processor model providing provably secure speculation for the constant-time policy. For constant-time programs under a non-speculative semantics, ProSpeCT guarantees that speculative and out-of-order execution cause no microarchitectural leaks. This guarantee is achieved by tracking secrets in the processor pipeline and ensuring that they do not influence the microarchitectural state during speculative execution. Our formalization covers a broad class of speculation mechanisms, generalizing prior work. As a result, our security proof covers all known Spectre attacks, including load value injection (LVI) attacks.

In addition to the formal model, we provide a prototype hardware implementation of ProSpeCT on a RISC-V processor and show evidence of its low impact on hardware cost, performance, and required software changes. In particular, the experimental evaluation confirms our expectation that for a compliant constant-time binary, enabling ProSpeCT incurs no performance overhead.”

Find the technical paper here. February 2023. Technical report for paper accepted at The 32nd USENIX Security Symposium (2023).

Authors: Daniel,Lesly-Ann; Bognar, Marton; Noorman,Job; Bardin, Sébastien; Rezk, Tamara; Piessens, Frank. arXiv:2302.12108v1

Leave a Reply

(Note: This name will be displayed publicly)