Verifiable instruction execution

Verifiable instruction is a special type of computer instruction whose purpose is similar to the instruc- tion set encryption mentioned in the previous sec- tion, and it is an important technique to guarantee the security of computer programs, which has wide application in systems with high security require- ments. In contrast to instruction set encryption, verifiable instruction execution focuses more on the security and correctness of program operation, so that the execution process of a computer pro- gram can be verified and the result of the program can be ensured to be correct. Verifiable instruc- tions are often used in systems with high security requirements, such as smart cards, encrypted com- munications, financial transactions, and other areas. Among the chip instructions, there are basic in- struction sets such as the following ones:

1.SGX instructions:

Intel SGX is a security en- hancement technology that can be used to protect confidential information and code. the SGX instruc- tion set includes enclave creation, enclave entry, and enclave exit instructions to ensure the confiden- tiality and security of the computing process.

2.ARM TrustZone Instructions:

ARM TrustZone is a security technology that can be used to secure processors and systems. The TrustZone instruction set includes instructions such as Secure Monitor calls, TrustZone registers, and other in- structions to ensure the security and integrity of the computing process.

3.MIPS TrustZone instructions:

MIPS TrustZone is a security technology that can be used to protect the security and integrity of the system. The MIPS TrustZone instruction set includes Secure Monitor call, Secure Monitor return and other in- structions to ensure the confidentiality and security of the computing process.

4.RISC-V PMP instructions:

RISC-V PMP(Physical Memory Protection) is a memory pro- tection technology that can be used to protect the security and integrity of a system. the PMP instruc- tion set includes instructions such as permission management for physical memory access, which is used to ensure the security and integrity of pro- grams.The implementation principle of verifiable in- structions is based on the zero-knowledge proof technique and computable security technique in cryptography. Specifically, verifiable instructions can achieve the following important program protection functions: 1. Prevention of malicious tampering: verifiable instructions can ensure that the execution process of instructions is not tamperable and prevent malicious tampering with the execution process of programs. 2.Confirmation of program correctness: verifiable instructions can prove that the execution process of programs is correct, thus avoiding system crashes and data corruption caused by program errors. 3. Prevention of Information leakage: Verifiable instructions can ensure the secu- rity of programs and data, and prevent information leakage and malicious attacks. 4. Improvement of performance efficiency: Verifiable instructions can reduce the execution time and computation of programs, and thus improve the performance effi- ciency of programs. Overall, verifiable instructions play a critical role in the security, integrity and correctness of program operation.

Last updated