Skip to main content

Showing 1–3 of 3 results for author: Marquer, Y

.
  1. arXiv:2402.10773  [pdf, other

    cs.CR cs.SE

    AIM: Automated Input Set Minimization for Metamorphic Security Testing

    Authors: Nazanin Bayati Chaleshtari, Yoann Marquer, Fabrizio Pastore, Lionel C. Briand

    Abstract: Although the security testing of Web systems can be automated by generating crafted inputs, solutions to automate the test oracle, i.e., distinguishing correct from incorrect outputs, remain preliminary. Specifically, previous work has demonstrated the potential of metamorphic testing; indeed, security failures can be determined by metamorphic relations that turn valid inputs into malicious inputs… ▽ More

    Submitted 21 February, 2024; v1 submitted 16 February, 2024; originally announced February 2024.

  2. arXiv:2306.06115  [pdf, other

    cs.SE cs.CR

    The TeamPlay Project: Analysing and Optimising Time, Energy, and Security for Cyber-Physical Systems

    Authors: Benjamin Rouxel, Christopher Brown, Emad Ebeid, Kerstin Eder, Heiko Falk, Clemens Grelck, Jesper Holst, Shashank Jadhav, Yoann Marquer, Marcos Martinez De Alejandro, Kris Nikov, Ali Sahafi, Ulrik Pagh Schultz Lundquist, Adam Seewald, Vangelis Vassalos, Simon Wegener, Olivier Zendra

    Abstract: Non-functional properties, such as energy, time, and security (ETS) are becoming increasingly important in Cyber-Physical Systems (CPS) programming. This article describes TeamPlay, a research project funded under the EU Horizon 2020 programme between January 2018 and June 2021. TeamPlay aimed to provide the system designer with a toolchain for develo** embedded applications where ETS properties… ▽ More

    Submitted 1 June, 2023; originally announced June 2023.

    Journal ref: Design, Automation and Test in Europe, Apr 2023, Antwerp, Belgium

  3. arXiv:2103.04606  [pdf, other

    cs.CR

    A Hole in the Ladder: Interleaved Variables in Iterative Conditional Branching (Extended Version)

    Authors: Yoann Marquer, Tania Richmond, Pascal VĂ©ron

    Abstract: The iterative conditional branchings appear in various sensitive algorithms, like the modular exponentiation in the RSA cryptosystem or the scalar multiplication in ellipticcurve cryptography. In this paper, we abstract away the desirable security properties achieved by the Montgomery ladder, and formalize systems of equations necessary to obtain what we call the semi-interleaved and fully-interle… ▽ More

    Submitted 8 March, 2021; originally announced March 2021.