Dice Question Streamline Icon: https://streamlinehq.com

Writing real-world programs that operate securely on untrusted hardware

Develop techniques to design and implement real-world programs that can operate correctly and securely on untrusted hardware, mitigating the security consequences of intermittent and probabilistic hardware misbehavior under current architectures.

Information Square Streamline Icon: https://streamlinehq.com

Background

The paper highlights the gap between program properties verified at higher abstraction levels and vulnerabilities that arise at lower levels due to microarchitectural behaviors and hardware defects. This gap undermines guarantees established at the software level.

Quoting prior work, the authors emphasize that the community does not yet know how to build real-world software that can safely operate when the underlying hardware cannot be trusted, underscoring a fundamental open challenge at the software–hardware boundary.

References

We do not know how to write real-world programs that can operate on untrusted hardware. Any tiny, innocent-looking, intermittent and probabilistic misbehavior can, under current architectures, have disastrous security implications.

Fundamental Challenges in Cybersecurity and a Philosophy of Vulnerability-Guided Hardening (2402.01944 - Böhme, 2 Feb 2024) in Section 2.3.2 Abstraction