Loading [a11y]/accessibility-menu.js
End-to-End Automated Exploit Generation for Validating the Security of Processor Designs | IEEE Conference Publication | IEEE Xplore

End-to-End Automated Exploit Generation for Validating the Security of Processor Designs


Abstract:

This paper presents Coppelia, an end-to-end tool that, given a processor design and a set of security-critical invariants, automatically generates complete, replayable ex...Show More

Abstract:

This paper presents Coppelia, an end-to-end tool that, given a processor design and a set of security-critical invariants, automatically generates complete, replayable exploit programs to help designers find, contextualize, and assess the security threat of hardware vulnerabilities. In Coppelia, we develop a hardware-oriented backward symbolic execution engine with a new cycle stitching method and fast validation technique, along with several optimizations for exploit generation. We then add program stubs to complete the exploit. We evaluate Coppelia on three CPUs of different architectures. Coppelia is able to find and generate exploits for 29 of 31 known vulnerabilities in these CPUs, including 11 vulnerabilities that commercial and academic model checking tools can not find. All of the generated exploits are successfully replayable on an FPGA board. Moreover, Coppelia finds 4 new vulnerabilities along with exploits in these CPUs. We also use Coppelia to verify whether a security patch indeed fixed a vulnerability, and to refine a set of assertions.
Date of Conference: 20-24 October 2018
Date Added to IEEE Xplore: 13 December 2018
ISBN Information:
Conference Location: Fukuoka, Japan

Contact IEEE to Subscribe