aLEAKator: HDL Mixed-Domain Simulation for Masked Hardware \& Software Formal Verification
By: Noé Amiot , Quentin L. Meunier , Karine Heydemann and more
Potential Business Impact:
Checks if secret computer code is safe from spies.
Verifying the security of masked hardware and software implementations, under advanced leakage models, remains a significant challenge, especially then accounting for glitches, transitions and CPU micro-architectural specifics. Existing verification approaches are either restricted to small hardware gadgets, small programs on CPUs such as Sboxes, limited leakage models, or require hardware-specific prior knowledge. In this work, we present aLEAKator, an open-source framework for the automated formal verification of masked cryptographic accelerators and software running on CPUs from their HDL descriptions. Our method introduces mixed-domain simulation, enabling precise modeling and verification under various (including robust and relaxed) 1-probing leakage models, and supports variable signal granularity without being restricted to 1-bit wires. aLEAKator also supports verification in the presence of lookup tables, and does not require prior knowledge of the target CPU architecture. Our approach is validated against existing tools and real-world measurements while providing innovative results such as the verification of a full, first-order masked AES on various CPUs
Similar Papers
AMuLeT: Automated Design-Time Testing of Secure Speculation Countermeasures
Cryptography and Security
Finds hidden computer security flaws faster.
LeakSealer: A Semisupervised Defense for LLMs Against Prompt Injection and Leakage Attacks
Cryptography and Security
Stops hackers from stealing your private information.
CorrectHDL: Agentic HDL Design with LLMs Leveraging High-Level Synthesis as Reference
Artificial Intelligence
Fixes computer chip designs made by AI.