𝜇CFI: Formal Verification of Microarchitectural Control-flow Integrity
- 👤 Speaker: Katharina Ceesay-Seitz, ETH Zurich
- 📅 Date & Time: Monday 30 June 2025, 13:00 - 14:00
- 📍 Venue: Computer Laboratory, William Gates Building, LT2
Abstract
abstract
Formal verification of hardware often requires the creation of clock-cycle accurate properties that need tedious and error-prone adaptations for each design. Property violations further require attention from verification engineers to identify affected instructions. This oftentimes manual effort hinders the adoption of formal verification at scale. This talk introduces Microarchitectural Control-Flow Integrity (𝜇CFI), a new general security property that can capture multiple classes of vulnerabilities under different threat models, most notably the microarchitectural violation of constant-time execution and (micro-)architectural vulnerabilities that allow an attacker to hijack the (architectural) control flow. We show a novel approach for the verification of 𝜇CFI using a single property that checks for information flows from instruction operands to the program counter by injecting taint at appropriate clock cycles.
To check arbitrary sequences of instructions and associate property violations to a specific Instruction Under Verification (IUV), we propose techniques for declassifying tainted data when it is being written to registers and forwarded from the IUV through architecturally known paths. We show that our verification approach is low effort (e.g., requires tagging six signals) while capturing all interactions between unbounded sequences of instructions in the extended threat model of 𝜇CFI. We verify four RISC -V CPUs against 𝜇CFI and prove that 𝜇CFI is satisfied in many cases while detecting five new security vulnerabilities (4 CVEs), three of which are in Ibex, which has already been checked by state-of-the-art verification approaches.
bio
Katharina Ceesay-Seitz gained several years of experience as embedded software developer and in formal verification related to functional safety at CERN and in the automotive field. She holds a Bachelor in software engineering and a Master’s in embedded systems, both from TU Wien. For her master thesis she received the Award of the Faculty of Electrical Engineering and Information Technology from TU Wien and the TÜV Austria Science Award. Currently she pursues a doctoral degree in hardware security at ETH Zurich, working on formal verification of CPU microarchitectures.
Series This talk is part of the compiler socials series.
Included in Lists
- All Talks (aka the CURE list)
- bld31
- Cambridge talks
- compiler socials
- Computer Laboratory Computer Architecture Group Meeting
- Computer Laboratory, William Gates Building, LT2
- Department of Computer Science and Technology talks and seminars
- Interested Talks
- School of Technology
- Trust & Technology Initiative - interesting events
- yk449
Note: Ex-directory lists are not shown.
![[Talks.cam]](/static/images/talkslogosmall.gif)

Katharina Ceesay-Seitz, ETH Zurich
Monday 30 June 2025, 13:00-14:00