Skip to main content

Formally Verifying a Rollback-Prevention Protocol for TEEs

Publication ,  Conference
Wang, W; Niu, J; Reiter, MK; Zhang, Y
Published in: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
January 1, 2024

Formal verification of distributed protocols is challenging and usually requires great human effort. Ivy, a state-of-the-art formal verification tool for modeling and verifying distributed protocols, automates this tedious process by leveraging a decidable fragment of first-order logic. Observing the successful adoption of Ivy for verifying consensus protocols, we examine its practicality in verifying rollback-prevention protocols for Trusted Execution Environments (TEEs). TEEs suffer from rollback attacks, which can revert confidential applications’ states to stale ones to compromise security. Recently, designing distributed protocols to prevent rollback attacks has attracted significant attention. However, the lack of formal verification of these protocols leaves them potentially vulnerable to security breaches. In this paper, we leverage Ivy to formally verify a rollback-prevention protocol, namely the TIKS protocol in ENGRAFT (Wang et al., CCS 2022). We select TIKS because it is similar to other rollback-prevention protocols and is self-contained. We detail the verification process of using Ivy to prove a rollback-prevention protocol, present lessons learned from this exploration, and release the proof code to facilitate future research (https://github.com/wwl020/TIKS-Proof-in-Ivy). To the best of our knowledge, this is the first endeavor to explain the formal verification of a rollback-prevention protocol in detail.

Duke Scholars

Altmetric Attention Stats
Dimensions Citation Stats

Published In

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

DOI

EISSN

1611-3349

ISSN

0302-9743

Publication Date

January 1, 2024

Volume

14678 LNCS

Start / End Page

155 / 173

Related Subject Headings

  • Artificial Intelligence & Image Processing
  • 46 Information and computing sciences
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Wang, W., Niu, J., Reiter, M. K., & Zhang, Y. (2024). Formally Verifying a Rollback-Prevention Protocol for TEEs. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 14678 LNCS, pp. 155–173). https://doi.org/10.1007/978-3-031-62645-6_9
Wang, W., J. Niu, M. K. Reiter, and Y. Zhang. “Formally Verifying a Rollback-Prevention Protocol for TEEs.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 14678 LNCS:155–73, 2024. https://doi.org/10.1007/978-3-031-62645-6_9.
Wang W, Niu J, Reiter MK, Zhang Y. Formally Verifying a Rollback-Prevention Protocol for TEEs. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2024. p. 155–73.
Wang, W., et al. “Formally Verifying a Rollback-Prevention Protocol for TEEs.” Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 14678 LNCS, 2024, pp. 155–73. Scopus, doi:10.1007/978-3-031-62645-6_9.
Wang W, Niu J, Reiter MK, Zhang Y. Formally Verifying a Rollback-Prevention Protocol for TEEs. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2024. p. 155–173.

Published In

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

DOI

EISSN

1611-3349

ISSN

0302-9743

Publication Date

January 1, 2024

Volume

14678 LNCS

Start / End Page

155 / 173

Related Subject Headings

  • Artificial Intelligence & Image Processing
  • 46 Information and computing sciences