← ALL RFDS
RFD 040 idea

Model Tenancy Ledger Attestation

AUTHOR Oxford Martin AI Governance Initiative CREATED 2024-11-27
verificationinferenceloggingattestationhardware

The Idea

Hardware mechanism that maintains a tamper-evident log of all models ever loaded into GPU memory. Every model-loading operation writes a fingerprint and timestamp to nonvolatile storage. Remote attestation or physical inspection can reveal this complete history.

This creates an audit trail proving which models have run on governed hardware, enabling detection of unauthorized model deployment.

Why It Matters

Model fingerprint attestation (RFD 041) proves what’s loaded now. The tenancy ledger proves what’s ever been loaded. This enables:

  • Detecting past policy violations even if current state is compliant
  • Verifying that only approved models have ever run on specific hardware
  • Enforcing bans on inference using models with unknown fingerprints
  • Auditing after incidents to determine what models were involved

Architecture

┌─────────────────────────────────────────────────────────┐
│                      GPU / ACCELERATOR                  │
│                                                         │
│  ┌─────────────────┐      ┌─────────────────────────┐  │
│  │   HBM / MEMORY  │      │   GUARANTEE PROCESSOR   │  │
│  │                 │      │                         │  │
│  │  [Model Weights]│─────►│  • Compute fingerprint  │  │
│  │                 │      │  • Write to ledger      │  │
│  └─────────────────┘      │  • Sign with device key │  │
│                           └───────────┬─────────────┘  │
│                                       │                 │
│                           ┌───────────▼─────────────┐  │
│                           │   NONVOLATILE LEDGER    │  │
│                           │                         │  │
│                           │  Entry 1: [FP, TS, Sig] │  │
│                           │  Entry 2: [FP, TS, Sig] │  │
│                           │  Entry 3: [FP, TS, Sig] │  │
│                           │  ...                    │  │
│                           └─────────────────────────┘  │
└─────────────────────────────────────────────────────────┘

Ledger Entry Format

Each entry contains:

FieldSizeDescription
Model fingerprint32 bytesSHA-256 of model weights
Timestamp8 bytesHardware-attested time of loading
Load duration4 bytesHow long model was in memory
Device signature64 bytesSigned by hardware private key
Sequence number8 bytesMonotonic counter (prevents deletion)

Total: ~116 bytes per entry

Storage Requirements

ScenarioEntries/dayStorage/year
Inference server (frequent swaps)100~4 MB
Training cluster (rare swaps)1~40 KB
High-churn multi-tenant1000~40 MB

Modest nonvolatile storage (GB-scale) provides decades of history.

Attestation Protocol

1. VERIFIER requests ledger attestation

2. HARDWARE reads ledger contents

3. GUARANTEE PROCESSOR:
   - Computes hash of complete ledger
   - Signs hash with device private key
   - Includes current sequence number

4. RESPONSE sent to Verifier:
   - Full ledger contents (or summary)
   - Signed attestation of completeness

5. VERIFIER checks:
   - Signature valid for known device key
   - Sequence numbers contiguous (no gaps)
   - All fingerprints on approved list

Tamper Resistance

AttackMitigation
Delete entriesMonotonic sequence number creates detectable gaps
Modify entriesEach entry signed by hardware key
Replace entire ledgerLedger hash periodically committed externally
Rollback to earlier stateExternal commitments detect rollback
Compromise hardware keyKey extraction difficulty, multi-party verification

Privacy Considerations

Full ledger reveals:

  • All models ever used (may be trade secrets)
  • Usage patterns and timing
  • Potentially sensitive workload information

Mitigation options:

  • Reveal only hashes, prove membership in approved set via ZKP
  • Aggregate attestation (“only approved models used”) without details
  • Time-delayed revelation (escrow)

Open Questions

  • How to manage ledger size over long hardware lifetimes?
  • Can security be maintained without relying solely on hardware private keys?
  • How to handle legitimate model updates and versioning? (Same model, different versions)
  • What happens when hardware is sold or repurposed between organizations?
  • How to handle tensor-parallel models split across multiple devices?
  • Can the ledger survive hardware failures and still be attestable?

References

  • Oxford Martin source document Appendix L.5
  • TPM (Trusted Platform Module) event log design
  • Blockchain-inspired append-only log structures