anishathalye / chroniton

A tool for formally verifying constant-time software against hardware 🕰️

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Chroniton Build Status

Chroniton is a tool for verifying constant-time behavior of cryptographic software. Instead of using leakage models, Chroniton directly verifies software with respect to a hardware implementation at the RTL level.

$ racket picorv32-ed25519.rkt
...
verified! execution finishes in 4046298 cycles

For more details on Chroniton, see the paper or slides (.key, .pdf).

Organization

This repository contains the Chroniton Racket library (in chroniton/) and a number of examples (in examples/), including both expository examples as well as examples verifying cryptographic code on various hardware.

Examples

Hardware

Located in examples/hardware/.

  • PicoRV32: a tiny RISC-V CPU. This repository also contains a simple SoC built around it.
  • Ibex: a small production-quality 32-bit RISC-V CPU core. This repository contains a slightly modified version of the CPU (to work with our Verilog-to-Rosette pipeline, removing async resets and clock gating).
  • biRISC-V: a dual-issue in-order 6-stage-pipelined RISC-V CPU. This repository contains a slightly modified version of the CPU (to work with our Verilog-to-Rosette pipeline, removing async resets for example) and a modified version of the testbench to serve as a simple model of a SoC.
  • OpenTitan Big Number Accelerator (OTBN): a cryptographic accelerator in the OpenTitan. This repository contains a heavily modified version of the OTBN, to make it work as a standalone device and to simplify it. Simplifications include removing memory scrambling and removing SECDED encoding.

Software

Located in examples/software/.

  • mul64: an expository example, a program that multiplies two 64-bit numbers together on a RISC-V processor.
  • branch-padding: a program that demonstrates branching with padding for overall constant-time behavior. The padding is tuned for the PicoRV32 (and also happens to run in constant time on the Ibex), so it'll verify against that, but when run on the biRISC-V, it will not have constant-time behavior (which is caught by Chroniton).
  • ed25519: an off-the-shelf C implementation of Ed25519 signatures, along with some driver code. This runs on the RISC-V processors.
  • wadd: an expository example, a program that adds two 256-bit numbers together using the bn.add instruction on the OTBN.
  • x25519: an off-the-shelf OTBN assembly implementation of X25519 key exchange, along with some driver code.

Usage

To build hardware implementations, run make in the corresponding directory to synthesize Racket code from the Verilog. For performance, you should compile the Racket code ahead of time with raco make {name}.rkt. This can take up to 1 minute (for otbn.rkt). To build software, run make in the corresponding directory to produce memory images. You can also run make in the examples/ directory to build all hardware and software.

The examples/ directory contains the top-level Chroniton invocation, including the "hints", the untrusted proof input Chroniton uses to improve performance, for all the examples. The naming convention is {hardware name}-{software name}.rkt, so e.g., to run the mul64 example on the biriscv, run racket biriscv-mul64.rkt.

You can also run the examples using a standard Verilog simulator (Icarus Verilog) (on concrete inputs, of course). The naming convention for these testbenches is {hardware name}-{software name}.v. To run, for example, the mul64 example on the biriscv, run make biriscv_mul64.vvp to compile the circuit, and then vvp biriscv_mul64.vvp to run it. The testbenches save VCDs in {hardware name}-{software name}.vcd.

Docker image

We provide a Docker image that includes all the dependencies. You can download it with docker pull anishathalye/chroniton.

To mount the repository on /chroniton and get a shell in the Docker image, run:

docker run -it --rm -v "${PWD}/:/chroniton" -w /chroniton anishathalye/chroniton

Dependencies

If you want to install the dependencies locally, here is what you need:

Artifacts

For easy reproducibility, we have published the outputs/binaries produced by the synthesis tool (.rkt file) and the compiler (.mem, .elf, and .lst files). If you use a different Yosys or GCC version, you might see different results. We used the following versions of the tools (which are included in the Docker image):

$ riscv64-linux-gnu-gcc --version
riscv64-linux-gnu-gcc (Ubuntu 11.3.0-1ubuntu1~22.04.1) 11.3.0

$ yosys --version
Yosys 0.29 (git sha1 9c5a60eb2, clang 14.0.0-1ubuntu1 -fPIC -Os)

Citation

@inproceedings{chroniton:plarch23,
    author =    {Anish Athalye and M. Frans Kaashoek and Nickolai Zeldovich and Joseph Tassarotti},
    title =     {Leakage models are a leaky abstraction: the case for cycle-level verification of constant-time cryptography},
    month =     {jun},
    year =      {2023},
    booktitle = {1st Workshop on Programming Languages and Computer Architecture~(PLARCH)},
    address =   {Orlando, FL},
}

About

A tool for formally verifying constant-time software against hardware 🕰️

License:MIT License


Languages

Language:Racket 68.3%Language:Dockerfile 31.7%