Hardware supply-chain attacks are raising significant security threats to the boot process of multiprocessor systems. This paper identifies a new, prevalent hardware supply-chain attack surface that can bypass multiprocessor secure boot due to the absence of processor-authentication mechanisms. To defend against such attacks, we present PA-Boot, the first formally verified processor-authentication protocol for secure boot in multiprocessor systems. PA-Boot is proved functionally correct and is guaranteed to detect multiple adversarial behaviors, e.g., processor replacements, man-in-the-middle attacks, and tampering with certificates. The fine-grained formalization of PA-Boot and its fully mechanized security proofs are carried out in the Isabelle/HOL theorem prover with 306 lemmas/theorems and ~7,100 LoC. Experiments on a proof-of-concept implementation indicate that PA-Boot can effectively identify boot-process attacks with a considerably minor overhead and thereby improve the security of multiprocessor systems.
翻译:硬件供应链攻击正在对多处理器系统的启动过程造成严重的安全威胁。 本文确定了一个新的、普遍的硬件供应链攻击表面,由于缺乏处理器认证机制,它可以绕过多处理器安全启动器。 为了防范这种袭击,我们向多处理器系统中安全启动器的经正式核实的首个程序处理器认证协议PA-Booot提交了PA-Booot,这是第一个在多处理器系统中安全启动器上经过正式核查的流程处理器认证协议。 PA-Boot在功能上被证明是正确的,并且保证能够发现多种对抗行为,例如处理器替换、中继器袭击和篡改证书。 PA-Boot的精细化正规化及其完全机械化的安全证明在Isabelle/HOL Theorem验证器中进行,有306个 Lemm/therams and ~71 LoC。 测试实施测试实验表明,PA-Boot能够有效地识别使用相当小的顶部的启动器袭击,从而改进多处理器系统的安全。