Design and Formal Verification of Hardware/software Security Mechanisms
il y a 2 semaines
**Design and Formal Verification of Hardware/Software Security Mechanisms**:
- Réf **ABG-128442**
- Sujet de Thèse
- 10/02/2025
- Contrat doctoral
- CentraleSupelec
- Lieu de travail- Rennes - Bretagne - France
- Intitulé du sujet- Design and Formal Verification of Hardware/Software Security Mechanisms
- Champs scientifiques- Informatique
- Mots clés- cyber-security, embedded systems, formal methods, computer architecture, fault-injection
**Description du sujet**:
**Context.**Embedded systems are increasingly targeted by attackers, facing not only traditional software attacks—such as those exploiting memory safety vulnerabilities like buffer overflows—but also hardware attacks. Among the last ones, fault-injection attacks exploit hardware perturbations to move a processor into unexpected states or execution paths, potentially exposing secrets or escalating privileges. Such attacks represent an effective threat to embedded systems and leverage faults inside the processor microarchitecture, resulting in various effects at the software level [5]. However, state-of-the-art countermeasures have only recently begun addressing the fault sensitivity of microarchitectural components. Furthermore, the formal verification of the security of a processor design in a threat model that includes fault injection remains an open challenge [9]. Security mechanisms, targeting not only fault injections pure also pure software attacks, must indeed be designed so that their implementations can be formally proven. This would enable systems to be evaluated, for instance, following Common Criteria (ISO 15408) at a high level of assurance (EAL 6 and above require formal proof). The national TwinSec research project, which frames this PhD proposal, brings together several French laboratories specializing in hardware and software security to model and analyze fault-injections’ effects at physical, hardware (HW), Instruction Set Architecture (ISA) and software (SW) levels. It focuses on physical attacks and mainly on fault injection using lasers. Existing modeling tools are not yet capable of efficiently predicting a embedded systems’ resistance to such attacks due to generic fault models. TwinSec proposes a more realistic attacker model through multi-level analysis to identify and cancel, at the design stage, microarchitecture-specific vulnerabilities. A key approach in this research involves HW/SW contracts [4, 6], which serve as formal abstractions at the ISA level. These contracts enables system designers to reason about security properties of HW implementations independently from SW implementations and vice versa. This PhD project seeks to leverage HW/SW contracts to design and formally verify hybrid security mechanisms that integrate both hardware and software components.
**Background**. In previous work, the SUSHI team relied on the Kˆoika language developed at MIT [2] and proposed a framework to formally specify and prove hardware security mechanism 1. We have explored implementing a formally proven Control Flow Integrity mechanism in a RISC-V CPU developed in Kˆoika 2, although in a limited setting [1]. In particular, we only ensure backward-edge security with a simple shadow stack, which is of fixed size and cannot be changed between processes. However, this forms a basis for proving more complex security mechanisms. Our current approach consists in automatically compiling Kˆoika designs to a more explicit representation, and then manually proving the properties of interest on this representation. The manual proof effort for this second step is still very high, and specific to each property and security mechanism. In order to automate this last step, we have started to leverage SMT (Satisfiability Modulo Theory) solvers. This approach looks promising: we have succeeded in automatically proving the security properties of the shadow stack described in [1]. Several academic and industrial actors have now adopted the Chisel HDL 3 to design their RISC-V core, e.g., SiFive, Berkeley, or Google. We are now designing a new formal HDL in Coq (COQQTL4 ) that directly maps FIRRTL 5, the intermediate language used in the compilation of circuits described in Chisel. This formal HDL could help the adoption of our verification framework to evaluate HW/SW security extensions. Concerning fault injection attacks, we propose to consider a recent countermeasure developed at the CEA, MAFIA [3], that protects the control signals of a processor microarchitecture against fault injection attacks, as a use case driving the research work in this thesis. MAFIA was originally implemented in RTL (System Verilog) and integrated into a RISC-V RV32IM 4-stage, in-order core, the CV32E40P processor. The implementation was formally verified in part [3], using µArchiFI, an open-source tool dedicated to the formal modeling and verification of microarchitecture-level fault injections and their effects on complex hardware/software systems [8].
**PhD Topic.**The
-
Python Software Engineer
il y a 7 jours
Rennes, France Canonical Temps pleinPython Software Engineer - Ubuntu Hardware Certification TeamJoin to apply for the Python Software Engineer - Ubuntu Hardware Certification Team role at CanonicalPython Software Engineer - Ubuntu Hardware Certification Team3 months ago Be among the first 25 applicantsJoin to apply for the Python Software Engineer - Ubuntu Hardware Certification Team role at...
-
Security Evaluation of Ai-based Hardware
il y a 2 semaines
Rennes, France Université de Rennes - IETR Temps plein**Security Evaluation of AI-Based Hardware Accelerator Units**: - Réf **ABG-125527** - Sujet de Thèse- 26/08/2024- Contrat doctoral- Université de Rennes - IETR- Lieu de travail- Rennes - Bretagne - France- Intitulé du sujet- Security Evaluation of AI-Based Hardware Accelerator Units- Champs scientifiques- Electronique - Numérique - Science de la...
-
Head of Security Operations
il y a 7 jours
Rennes, France Canonical Temps pleinJoin to apply for the Head of Security Operations role at CanonicalContinue with Google Continue with Google3 months ago Be among the first 25 applicantsJoin to apply for the Head of Security Operations role at CanonicalThis global leadership role in cyber security is to manage the Security Operations (SecOps) team responsible for design, implementation and...
-
Windows Security Engineer
il y a 3 jours
Rennes, France Harmonic Inc. Temps plein**Harmonic is looking for its new Windows Security Engineer - AD Expert!** **Role summary** **Qualifications** **Requirements**: At least 5 years of experience, dedicated to Active Directory and Windows Servers You will need to have in-depth knowledge of: - The operation of the Active Directory and its security - Authentication mechanisms (Kerberos,...
-
Security Engineer
il y a 13 heures
Rennes, France IDnow Temps pleinIDnow is a leader in digital identity and fraud prevention in Europe with a mission to transform trust into the most powerful asset in the digital world, empowering enterprises with AI-driven, SaaS-based identity solutions that deliver scalable security, adaptive compliance, and real-time fraud prevention. Through its broad portfolio of digital identity and...
-
Security Engineer
il y a 4 jours
Rennes, Bretagne, France IDnow Temps pleinIDnow is a leader in digital identity and fraud prevention in Europe with a mission to transform trust into the most powerful asset in the digital world, empowering enterprises with AI-driven, SaaS-based identity solutions that deliver scalable security, adaptive compliance, and real-time fraud prevention.Through its broad portfolio of digital identity and...
-
Cybersecurity - Software Security Engineer
il y a 1 semaine
Rennes, Bretagne, France Skyld AI Temps pleinOverviewSkyld is a deeptech company that edits cybersecurity solutions for AI systems. We want to address trust, privacy and intellectual property challenges raised by the massive use of AI algorithms. We are accelerated by UC. Berkeley and Station F and backed by top European investors.We are looking for an engineer in software security. You will work on...
-
Ubuntu Core Software Engineer
il y a 7 jours
Rennes, France Canonical Temps pleinJoin to apply for the Ubuntu Core Software Engineer role at Canonical 2 days ago Be among the first 25 applicants Get AI-powered advice on this job and more exclusive features. Canonical is a leading provider of open source software and operating systems to the global enterprise and technology markets. Our platform, Ubuntu, is widely used in enterprise...
-
Engineering Manager
il y a 7 jours
Rennes, France Canonical Temps pleinEngineering Manager - Security Standards and HardeningJoin to apply for the Engineering Manager - Security Standards and Hardening role at CanonicalEngineering Manager - Security Standards and Hardening3 days ago Be among the first 25 applicantsJoin to apply for the Engineering Manager - Security Standards and Hardening role at CanonicalGet AI-powered advice...
-
Security Engineer
il y a 13 heures
Rennes, France IDnow Group Temps pleinIDnow is a leader in digital identity and fraud prevention in Europe with a mission to transform trust into the most powerful asset in the digital world, empowering enterprises with AI-driven, SaaS-based identity solutions that deliver scalable security, adaptive compliance, and real-time fraud prevention. Through its broad portfolio of digital identity and...