Back to Explorer
Research PaperResearchia:202601.29112[Cryptography > Cybersecurity]

SecIC3: Customizing IC3 for Hardware Security Verification

Qinhan Tan

Abstract

Recent years have seen significant advances in using formal verification to check hardware security properties. Of particular practical interest are checking confidentiality and integrity of secrets, by checking that there is no information flow between the secrets and observable outputs. A standard method for checking information flow is to translate the corresponding non-interference hyperproperty into a safety property on a self-composition of the design, which has two copies of the design composed together. Although prior efforts have aimed to reduce the size of the self-composed design, there are no state-of-the-art model checkers that exploit their special structure for hardware security verification. In this paper, we propose SecIC3, a hardware model checking algorithm based on IC3 that is customized to exploit this self-composition structure. SecIC3 utilizes this structure in two complementary techniques: symmetric state exploration and adding equivalence predicates. We implement SecIC3 on top of two open-source IC3 implementations and evaluate it on a non-interference checking benchmark consisting of 10 designs. The experiment results show that SecIC3 significantly reduces the time for finding security proofs, with up to 49.3x proof speedup compared to baseline implementations.


Source: arXiv:2601.21353v1 - http://arxiv.org/abs/2601.21353v1 PDF: https://arxiv.org/pdf/2601.21353v1 Original Link: http://arxiv.org/abs/2601.21353v1

Submission:1/29/2026
Comments:0 comments
Subjects:Cybersecurity; Cryptography
Original Source:
View Original PDF
arXiv: This paper is hosted on arXiv, an open-access repository
Was this helpful?

Discussion (0)

Please sign in to join the discussion.

No comments yet. Be the first to share your thoughts!