Skip to main content

Showing 1–20 of 20 results for author: Piskac, R

.
  1. arXiv:2405.05193  [pdf, other

    cs.CR

    Systematic Use of Random Self-Reducibility against Physical Attacks

    Authors: Ferhat Erata, TingHung Chiu, Anthony Etim, Srilalith Nampally, Tejas Raju, Rajashree Ramu, Ruzica Piskac, Timos Antonopoulos, Wenjie Xiong, Jakub Szefer

    Abstract: This work presents a novel, black-box software-based countermeasure against physical attacks including power side-channel and fault-injection attacks. The approach uses the concept of random self-reducibility and self-correctness to add randomness and redundancy in the execution for protection. Our approach is at the operation level, is not algorithm-specific, and thus, can be applied for protecti… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

  2. arXiv:2401.15869  [pdf, other

    cs.CR

    Quantum Circuit Reconstruction from Power Side-Channel Attacks on Quantum Computer Controllers

    Authors: Ferhat Erata, Chuanqi Xu, Ruzica Piskac, Jakub Szefer

    Abstract: The interest in quantum computing has grown rapidly in recent years, and with it grows the importance of securing quantum circuits. A novel type of threat to quantum circuits that dedicated attackers could launch are power trace attacks. To address this threat, this paper presents first formalization and demonstration of using power traces to unlock and steal quantum circuit secrets. With access t… ▽ More

    Submitted 28 January, 2024; originally announced January 2024.

    Comments: IACR Transactions on Cryptographic Hardware and Embedded Systems

  3. arXiv:2311.07377  [pdf, other

    cs.SE cs.AI cs.DC cs.RO

    Testing learning-enabled cyber-physical systems with Large-Language Models: A Formal Approach

    Authors: Xi Zheng, Aloysius K. Mok, Ruzica Piskac, Yong Jae Lee, Bhaskar Krishnamachari, Dakai Zhu, Oleg Sokolsky, Insup Lee

    Abstract: The integration of machine learning (ML) into cyber-physical systems (CPS) offers significant benefits, including enhanced efficiency, predictive capabilities, real-time responsiveness, and the enabling of autonomous operations. This convergence has accelerated the development and deployment of a range of real-world applications, such as autonomous vehicles, delivery drones, service robots, and te… ▽ More

    Submitted 16 May, 2024; v1 submitted 13 November, 2023; originally announced November 2023.

  4. arXiv:2307.01532  [pdf, other

    cs.AI

    Analyzing Intentional Behavior in Autonomous Agents under Uncertainty

    Authors: Filip Cano Córdoba, Samuel Judson, Timos Antonopoulos, Katrine Bjørner, Nicholas Shoemaker, Scott J. Shapiro, Ruzica Piskac, Bettina Könighofer

    Abstract: Principled accountability for autonomous decision-making in uncertain environments requires distinguishing intentional outcomes from negligent designs from actual accidents. We propose analyzing the behavior of autonomous agents through a quantitative measure of the evidence of intentional behavior. We model an uncertain environment as a Markov Decision Process (MDP). For a given scenario, we rely… ▽ More

    Submitted 4 July, 2023; originally announced July 2023.

    Comments: 10 pages. Accepted for publication at IJCAI 2023 (Main Track)

  5. arXiv:2305.05731  [pdf, other

    cs.LO cs.CY cs.PL

    'Put the Car on the Stand': SMT-based Oracles for Investigating Decisions

    Authors: Samuel Judson, Matthew Elacqua, Filip Cano, Timos Antonopoulos, Bettina Könighofer, Scott J. Shapiro, Ruzica Piskac

    Abstract: Principled accountability in the aftermath of harms is essential to the trustworthy design and governance of algorithmic decision making. Legal theory offers a paramount method for assessing culpability: putting the agent 'on the stand' to subject their actions and intentions to cross-examination. We show that under minimal assumptions automated reasoning can rigorously interrogate algorithmic beh… ▽ More

    Submitted 29 January, 2024; v1 submitted 9 May, 2023; originally announced May 2023.

  6. Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic Code

    Authors: Ferhat Erata, Ruzica Piskac, Victor Mateu, Jakub Szefer

    Abstract: Although cryptographic algorithms may be mathematically secure, it is often possible to leak secret information from the implementation of the algorithms. Timing and power side-channel vulnerabilities are some of the most widely considered threats to cryptographic algorithm implementations. Timing vulnerabilities may be easier to detect and exploit, and all high-quality cryptographic code today sh… ▽ More

    Submitted 4 April, 2023; originally announced April 2023.

  7. arXiv:2209.14876  [pdf, other

    cs.SE cs.AI

    Repairing Bugs in Python Assignments Using Large Language Models

    Authors: Jialu Zhang, José Cambronero, Sumit Gulwani, Vu Le, Ruzica Piskac, Gustavo Soares, Gust Verbruggen

    Abstract: Students often make mistakes on their introductory programming assignments as part of their learning process. Unfortunately, providing custom repairs for these mistakes can require a substantial amount of time and effort from class instructors. Automated program repair (APR) techniques can be used to synthesize such fixes. Prior work has explored the use of symbolic and neural techniques for APR i… ▽ More

    Submitted 29 September, 2022; originally announced September 2022.

  8. arXiv:2206.01848  [pdf, other

    cs.SE

    Automated Feedback Generation for Competition-Level Code

    Authors: Jialu Zhang, De Li, John C. Kolesar, Hanyuan Shi, Ruzica Piskac

    Abstract: Competitive programming has become a popular way for programmers to test their skills. Large-scale online programming contests attract millions of experienced programmers to compete against each other. Competition-level programming problems are challenging in nature, and participants often fail to solve the problem on their first attempt. Some online platforms for competitive programming allow pro… ▽ More

    Submitted 3 June, 2022; originally announced June 2022.

  9. arXiv:2202.02729  [pdf, other

    cs.CR cs.NI

    IVeri: Privacy-Preserving Interdomain Verification

    Authors: Ning Luo, Qiao Xiang, Timos Antonopoulos, Ruzica Piskac, Y. Richard Yang, Franck Le

    Abstract: In an interdomain network, autonomous systems (ASes) often establish peering agreements, so that one AS (agreement consumer) can influence the routing policies of the other AS (agreement provider). Peering agreements are implemented in the BGP configuration of the agreement provider. It is crucial to verify their implementation because one error can lead to disastrous consequences. However, the fu… ▽ More

    Submitted 6 February, 2022; originally announced February 2022.

  10. ETAP: Energy-aware Timing Analysis of Intermittent Programs

    Authors: Ferhat Erata, Arda Goknil, Eren Yıldız, Kasım Sinan Yıldırım, Ruzica Piskac, Jakub Szefer, Gökçin Sezgin

    Abstract: Energy harvesting battery-free embedded devices rely only on ambient energy harvesting that enables stand-alone and sustainable IoT applications. These devices execute programs when the harvested ambient energy in their energy reservoir is sufficient to operate and stop execution abruptly (and start charging) otherwise. These intermittent programs have varying timing behavior under different energ… ▽ More

    Submitted 3 February, 2022; v1 submitted 27 January, 2022; originally announced January 2022.

    Comments: Corrected typos in the previous submission

  11. arXiv:2111.11904  [pdf, other

    cs.SE

    Can Pre-trained Language Models be Used to Resolve Textual and Semantic Merge Conflicts?

    Authors: Jialu Zhang, Todd Mytkowicz, Mike Kaufman, Ruzica Piskac, Shuvendu K. Lahiri

    Abstract: Program merging is standard practice when developers integrate their individual changes to a common code base. When the merge algorithm fails, this is called a merge conflict. The conflict either manifests in textual merge conflicts where the merge fails to produce code, or semantic merge conflicts where the merged code results in compiler or test breaks. Resolving these conflicts for large code p… ▽ More

    Submitted 23 November, 2021; originally announced November 2021.

  12. arXiv:2010.06631  [pdf, ps, other

    cs.LG cs.AI

    Succinct Explanations With Cascading Decision Trees

    Authors: Jialu Zhang, Yitan Wang, Mark Santolucito, Ruzica Piskac

    Abstract: The decision tree is one of the most popular and classical machine learning models from the 1980s. However, in many practical applications, decision trees tend to generate decision paths with excessive depth. Long decision paths often cause overfitting problems, and make models difficult to interpret. With longer decision paths, inference is also more likely to fail when the data contain missing v… ▽ More

    Submitted 29 November, 2022; v1 submitted 13 October, 2020; originally announced October 2020.

  13. arXiv:2002.02884  [pdf, ps, other

    cs.LG cs.PL stat.ML

    Grammar Filtering For Syntax-Guided Synthesis

    Authors: Kairo Morton, William Hallahan, Elven Shum, Ruzica Piskac, Mark Santolucito

    Abstract: Programming-by-example (PBE) is a synthesis paradigm that allows users to generate functions by simply providing input-output examples. While a promising interaction paradigm, synthesis is still too slow for realtime interaction and more widespread adoption. Existing approaches to PBE synthesis have used automated reasoning tools, such as SMT solvers, as well as works applying machine learning tec… ▽ More

    Submitted 7 February, 2020; originally announced February 2020.

  14. arXiv:1905.09825  [pdf, other

    cs.PL

    Synthesizing Functional Reactive Programs

    Authors: Bernd Finkbeiner, Felix Klein, Ruzica Piskac, Mark Santolucito

    Abstract: Functional Reactive Programming (FRP) is a paradigm that has simplified the construction of reactive programs. There are many libraries that implement incarnations of FRP, using abstractions such as Applicative, Monads, and Arrows. However, finding a good control flow, that correctly manages state and switches behaviors at the right times, still poses a major challenge to developers. An attractive… ▽ More

    Submitted 23 May, 2019; originally announced May 2019.

    Comments: arXiv admin note: text overlap with arXiv:1712.00246

  15. arXiv:1903.08571  [pdf, ps, other

    cs.LO

    Identifying Maximal Non-Redundant Integer Cone Generators

    Authors: Slobodan Mitrović, Ruzica Piskac, Viktor Kunčak

    Abstract: A non-redundant integer cone generator (NICG) of dimension $d$ is a set $S$ of vectors from $\{0,1\}^d$ whose vector sum cannot be generated as a positive integer linear combination of a proper subset of $S$. The largest possible cardinality of NICG of a dimension $d$, denoted by $N(d)$, provides an upper bound on the sparsity of systems of integer equations with a large number of integer variable… ▽ More

    Submitted 20 March, 2019; originally announced March 2019.

  16. arXiv:1805.04473  [pdf, other

    cs.SE

    Statically Verifying Continuous Integration Configurations

    Authors: Mark Santolucito, Jialu Zhang, Ennan Zhai, Ruzica Piskac

    Abstract: Continuous Integration (CI) testing is a popular software development technique that allows developers to easily check that their code can build successfully and pass tests across various system environments. In order to use a CI platform, a developer must include a set of configuration files to a code repository for specifying build conditions. Incorrect configuration settings lead to CI build fa… ▽ More

    Submitted 11 May, 2018; originally announced May 2018.

  17. Vehicle Platooning Simulations with Functional Reactive Programming

    Authors: Bernd Finkbeiner, Felix Klein, Ruzica Piskac, Mark Santolucito

    Abstract: Functional languages have provided major benefits to the verification community. Although features such as purity, a strong type system, and computational abstractions can help guide programmers away from costly errors, these can present challenges when used in a reactive system. Functional Reactive Programming is a paradigm that allows users the benefits of functional languages and an easy interf… ▽ More

    Submitted 27 March, 2018; originally announced March 2018.

    Comments: SCAV@CPSWeek 2017

  18. arXiv:1712.00246  [pdf, ps, other

    cs.LO

    Temporal Stream Logic: Synthesis beyond the Bools

    Authors: Bernd Finkbeiner, Felix Klein, Ruzica Piskac, Mark Santolucito

    Abstract: Reactive systems that operate in environments with complex data, such as mobile apps or embedded controllers with many sensors, are difficult to synthesize. Synthesis tools usually fail for such systems because the state space resulting from the discretization of the data is too large. We introduce TSL, a new temporal logic that separates control and data. We provide a CEGAR-based synthesis approa… ▽ More

    Submitted 8 May, 2019; v1 submitted 1 December, 2017; originally announced December 2017.

  19. Proceedings Fifth Workshop on Synthesis

    Authors: Ruzica Piskac, Rayna Dimitrova

    Abstract: The SYNT workshop aims to bring together researchers interested in the broad area of synthesis of computing systems. The goal is to foster the development of frontier techniques in automating the development of computing system. Contributions of interest include algorithms, complexity and decidability analysis, as well as reproducible heuristics, implemented tools, and experimental evaluation. Ap… ▽ More

    Submitted 22 November, 2016; originally announced November 2016.

    Journal ref: EPTCS 229, 2016

  20. arXiv:1301.7321  [pdf, other

    cs.LO

    Incremental, Inductive Coverability

    Authors: Johannes Kloos, Rupak Majumdar, Filip Niksic, Ruzica Piskac

    Abstract: We give an incremental, inductive (IC3) procedure to check coverability of well-structured transition systems. Our procedure generalizes the IC3 procedure for safety verification that has been successfully applied in finite-state hardware verification to infinite-state well-structured transition systems. We show that our procedure is sound, complete, and terminating for downward-finite well-struct… ▽ More

    Submitted 22 February, 2013; v1 submitted 30 January, 2013; originally announced January 2013.

    Comments: Non-reviewed version, original version submitted to CAV 2013; this is a revised version, containing more experimental results and some corrections