An Incomplete Reading List

This reading list is focused on literature that is relevant to remote-attested hardware that secure against physical and supply chain attackers. A lot of TEE security literature focuses on settings in which heavy sharing of hardware resources - this is not the focus of our line of work as we do not target this kind of multi-tenancy.

Non-Invasive Attacks

Masking

Dynamic leakage

Static leakage

Fault-based attacks on TEEs

  • Bypassing Isolated Execution on RISCV with Fault Injection
    • Shows how faults can be used to get around PMP which the the RISCV primitive used to provide memory isolation.
  • Combined Private Circuits
    • This paper provides the most up-to-date composable security definition for combined fault and probing attacks, improving on a previous paper. It also provides some gadgets that satisfy this property. It is the spiritual successor to the PINI security definition.
  • Prime Masking vs Faults
    • Fault attacks can allow attackers to observe faulty (or missing if safeguard exist) outputs that provide insight into input or intermediate values. Boolean masking does not defend well against this, but prime masking does. Boolean masking also requires minimum levels of noise present in the chip.
    • The properties of prime masking can be used to improve on the efficiency of Combined Private Circuit implementations given in the paper above.
    • This paper builds on previous research to prove that prime masking can be efficiently applied.
  • Beware Insufficient Redundancy
    • Demonstrates an attack on a design that is secure against an unrealistically weak adversary.
  • SCFI: State Machine Control-Flow Hardening Against Fault Attacks

Instruction Sets and Microarchitectures

Note, the section above provides the primitives required to build what we find in this section.

AI-specific

Invasive Attacks

DRAM attack and defense:

Tamper Resistance

Trojans

Other

Open Hardware Security Analyses/Contributions

Irreproducible Keys (Secrecy of Hardware Secrets)

Extending TEEs with prog crypto