Advances in Microarchitectural Security

The field of microarchitectural security is rapidly evolving, with a focus on developing innovative solutions to protect against side-channel attacks and ensure the integrity of computations. Recent research has highlighted the importance of robust validation mechanisms, such as composable golden models and hardware-assisted validation, to detect and prevent anomalous execution behaviors. Additionally, there is a growing emphasis on systematic timing leakage analysis and the development of tools to automate the verification of constant-time properties in cryptographic implementations. Furthermore, researchers are exploring new security abstractions, such as leakage contracts, and developing novel approaches to synthesize sound and precise contracts for processor designs. Noteworthy papers in this area include ShadowScope, which proposes a monitoring and validation framework for GPU kernel integrity, and SecSep, which introduces a transformation framework to secure cryptographic software via typed assembly language. Wanilla is also notable for presenting a sound noninterference analysis for WebAssembly, demonstrating the potential for static analysis to ensure memory integrity and security in this domain.

Sources

ShadowScope: GPU Monitoring and Validation via Composable Side Channel Signals

ShieldMMU: Detecting and Defending against Controlled-Channel Attacks in Shielding Memory System

Systematic Timing Leakage Analysis of NIST PQDSS Candidates: Tooling and Lessons Learned

Synthesis of Sound and Precise Leakage Contracts for Open-Source RISC-V Processors

Securing Cryptographic Software via Typed Assembly Language (Extended Version)

Wanilla: Sound Noninterference Analysis for WebAssembly

Built with on top of