PA-Boot: A Formally Verified Authentication Protocol for Multiprocessor Secure Boot

📅 2022-09-16
🏛️ arXiv.org
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Multi-processor systems are vulnerable to hardware supply-chain attacks—including chip substitution and man-in-the-middle (MitM) attacks—due to the absence of processor identity authentication during boot, thereby compromising secure boot integrity. This paper proposes the first formally verified processor authentication protocol for the boot phase, enabling fine-grained processor identity verification in multi-processor secure boot. We conduct full mechanized security verification in Isabelle/HOL, establishing 306 lemmas and theorems (≈7,100 lines of code), rigorously proving functional correctness and resilience against substitution, MitM, and certificate tampering attacks. A prototype implementation demonstrates negligible overhead while achieving efficient detection of boot-time attacks. Our approach significantly enhances the boot-time security assurance of multi-processor systems.
📝 Abstract
Hardware supply-chain attacks are raising significant security threats to the boot process of multiprocessor systems. This paper identifies a new, prevalent hardware supply-chain attack surface that can bypass multiprocessor secure boot due to the absence of processor-authentication mechanisms. To defend against such attacks, we present PA-Boot, the first formally verified processor-authentication protocol for secure boot in multiprocessor systems. PA-Boot is proved functionally correct and is guaranteed to detect multiple adversarial behaviors, e.g., processor replacements, man-in-the-middle attacks, and tampering with certificates. The fine-grained formalization of PA-Boot and its fully mechanized security proofs are carried out in the Isabelle/HOL theorem prover with 306 lemmas/theorems and ~7,100 LoC. Experiments on a proof-of-concept implementation indicate that PA-Boot can effectively identify boot-process attacks with a considerably minor overhead and thereby improve the security of multiprocessor systems.
Problem

Research questions and friction points this paper is trying to address.

Addresses hardware supply-chain attacks on multiprocessor boot
Introduces PA-Boot for verified processor-authentication in secure boot
Detects adversarial behaviors like processor replacements and tampering
Innovation

Methods, ideas, or system contributions that make the work stand out.

Formally verified processor-authentication protocol
Detects adversarial behaviors via Isabelle/HOL
Low-overhead secure boot for multiprocessors
🔎 Similar Papers
No similar papers found.
Z
Zhuoruo Zhang
Zhejiang University, Hangzhou 310027, China
Chenyang Yu
Chenyang Yu
Dalian University of Technology
Deep learning,person reidentification
H
He Huang
Zhejiang University, Hangzhou 310027, China
R
Rui Chang
Zhejiang University, Hangzhou 310027, China
Mingshuai Chen
Mingshuai Chen
Assistant Professor of Computer Science, Zhejiang University
Programming TheoriesHybrid SystemsLogicVerificationSynthesis
Q
Qinming Dai
Zhejiang University, Hangzhou 310027, China
Wenbo Shen
Wenbo Shen
Zhejiang University
Kernel SecurityContainer SecuritySystem Security
Y
Yongwang Zhao
Zhejiang University, Hangzhou 310027, China
K
K. Ren
Zhejiang University, Hangzhou 310027, China