Share your thoughts, 1 month free Claude Pro on usSee more
WorkDL logo mark

SecIC3: Customizing IC3 for Hardware Security Verification

About

Recent years have seen significant advances in using formal verification to check hardware security properties. Of particular practical interest are checking confidentiality and integrity of secrets, by checking that there is no information flow between the secrets and observable outputs. A standard method for checking information flow is to translate the corresponding non-interference hyperproperty into a safety property on a self-composition of the design, which has two copies of the design composed together. Although prior efforts have aimed to reduce the size of the self-composed design, there are no state-of-the-art model checkers that exploit their special structure for hardware security verification. In this paper, we propose SecIC3, a hardware model checking algorithm based on IC3 that is customized to exploit this self-composition structure. SecIC3 utilizes this structure in two complementary techniques: symmetric state exploration and adding equivalence predicates. We implement SecIC3 on top of two open-source IC3 implementations and evaluate it on a non-interference checking benchmark consisting of 10 designs. The experiment results show that SecIC3 significantly reduces the time for finding security proofs, with up to 49.3x proof speedup compared to baseline implementations.

Qinhan Tan, Akash Gaonkar, Yu-Wei Fan, Aarti Gupta, Sharad Malik• 2026

Related benchmarks

TaskDatasetResultRank
Hardware Security VerificationMultiplier hardware design
Verification Time0.1
8
Hardware Security VerificationModexp hardware design
Verification Time0.4
8
Hardware Security VerificationGCD hardware design
Verification Time9.3
8
Hardware Security VerificationFP_DIV hardware design
Proof Bound65
8
Hardware Security VerificationSodor
Verification Time0.4
8
Hardware Security VerificationRocket hardware design
Verification Time1.8
8
Hardware Security VerificationSecEnclave hardware design
Verification Time1.9
7
Hardware Security VerificationCache hardware design
Verification Time162
6
Hardware Security VerificationFP_ADD
Proof Bound13
4
Showing 9 of 9 rows

Other info

Follow for update