Skip to main content

Showing 1–19 of 19 results for author: Maffei, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.14400  [pdf, other

    cs.LO

    Verifying Global Two-Safety Properties in Neural Networks with Confidence

    Authors: Anagha Athavale, Ezio Bartocci, Maria Christakis, Matteo Maffei, Dejan Nickovic, Georg Weissenbacher

    Abstract: We present the first automated verification technique for confidence-based 2-safety properties, such as global robustness and global fairness, in deep neural networks (DNNs). Our approach combines self-composition to leverage existing reachability analysis techniques and a novel abstraction of the softmax function, which is amenable to automated verification. We characterize and prove the soundnes… ▽ More

    Submitted 17 June, 2024; v1 submitted 23 May, 2024; originally announced May 2024.

    Comments: Accepted at the 36th International Conference on Computer Aided Verification, 2024

  2. arXiv:2305.12173  [pdf, other

    cs.CR cs.LO

    CryptoVampire: Automated Reasoning for the Complete Symbolic Attacker Cryptographic Model

    Authors: Simon Jeanteur, Laura Kovács, Matteo Maffei, Michael Rawson

    Abstract: Cryptographic protocols are hard to design and prove correct, as witnessed by the ever-growing list of attacks even on protocol standards. Symbolic models of cryptography enable automated formal security proofs of such protocols against an idealized model, which abstracts away from the algebraic properties of cryptographic schemes and thus misses attacks. Computational models yield rigorous guaran… ▽ More

    Submitted 5 April, 2024; v1 submitted 20 May, 2023; originally announced May 2023.

  3. arXiv:2201.01649  [pdf, other

    cs.CR

    WebSpec: Towards Machine-Checked Analysis of Browser Security Mechanisms

    Authors: Lorenzo Veronese, Benjamin Farinier, Pedro Bernardo, Mauro Tempesta, Marco Squarcina, Matteo Maffei

    Abstract: The complexity of browsers has steadily increased over the years, driven by the continuous introduction and update of Web platform components, such as novel Web APIs and security mechanisms. Their specifications are manually reviewed by experts to identify potential security issues. However, this process has proved to be error-prone due to the extensiveness of modern browser specifications and the… ▽ More

    Submitted 1 September, 2022; v1 submitted 5 January, 2022; originally announced January 2022.

    Comments: Submitted to IEEE S&P '23 on 19 Aug 2022

  4. arXiv:2109.10229  [pdf, other

    cs.CR cs.CY

    Adoption and Actual Privacy of Decentralized CoinJoin Implementations in Bitcoin

    Authors: Rainer Stütz, Johann Stockinger, Bernhard Haslhofer, Pedro Moreno-Sanchez, Matteo Maffei

    Abstract: We present a first measurement study on the adoption and actual privacy of two popular decentralized CoinJoin implementations, Wasabi and Samourai, in the broader Bitcoin ecosystem. By applying highly accurate (> 99%) algorithms we can effectively detect 30,251 Wasabi and 223,597 Samourai transactions within the block range 530,500 to 725,348 (2018-07-05 to 2022-02-28). We also found a steady adop… ▽ More

    Submitted 14 September, 2022; v1 submitted 21 September, 2021; originally announced September 2021.

  5. arXiv:2109.07429  [pdf, ps, other

    cs.CR cs.GT

    Towards a Game-Theoretic Security Analysis of Off-Chain Protocols

    Authors: Sophie Rain, Georgia Avarikioti, Laura Kovács, Matteo Maffei

    Abstract: Off-chain protocols constitute one of the most promising approaches to solve the inherent scalability issue of blockchain technologies. The core idea is to let parties transact on-chain only once to establish a channel between them, leveraging later on the resulting channel paths to perform arbitrarily many peer-to-peer transactions off-chain. While significant progress has been made in terms of p… ▽ More

    Submitted 24 October, 2022; v1 submitted 15 September, 2021; originally announced September 2021.

    Comments: This submission is the extended version of our CSF 2023 paper "Towards a Game-Theoretic Security Analysis of Off-Chain Protocols"

  6. The Good, the Bad and the Ugly: Pitfalls and Best Practices in Automated Sound Static Analysis of Ethereum Smart Contracts

    Authors: Clara Schneidewind, Markus Scherer, Matteo Maffei

    Abstract: Ethereum smart contracts are distributed programs running on top of the Ethereum blockchain. Since program flaws can cause significant monetary losses and can hardly be fixed due to the immutable nature of the blockchain, there is a strong need of automated analysis tools which provide formal security guarantees. Designing such analyzers, however, proved to be challenging and error-prone. We revie… ▽ More

    Submitted 14 January, 2021; originally announced January 2021.

  7. arXiv:2012.01946  [pdf, other

    cs.CR

    Can I Take Your Subdomain? Exploring Related-Domain Attacks in the Modern Web

    Authors: Marco Squarcina, Mauro Tempesta, Lorenzo Veronese, Stefano Calzavara, Matteo Maffei

    Abstract: Related-domain attackers control a sibling domain of their target web application, e.g., as the result of a subdomain takeover. Despite their additional power over traditional web attackers, related-domain attackers received only limited attention by the research community. In this paper we define and quantify for the first time the threats that related-domain attackers pose to web application sec… ▽ More

    Submitted 3 December, 2020; originally announced December 2020.

    Comments: Submitted to USENIX Security '21 on 16 Oct 2020

  8. arXiv:2011.14341  [pdf, other

    cs.CR

    Optimizing Virtual Payment Channel Establishment in the Face of On-Path Adversaries

    Authors: Lukas Aumayr, Esra Ceylan, Yannik Kopyciok, Matteo Maffei, Pedro Moreno-Sanchez, Iosif Salem, Stefan Schmid

    Abstract: Payment channel networks (PCNs) are among the most promising solutions to the scalability issues in permissionless blockchains, by allowing parties to pay each other off-chain through a path of payment channels (PCs). However, routing transactions comes at a cost which is proportional to the number of intermediaries, since each charges a fee for the routing service. Furthermore, analogous to other… ▽ More

    Submitted 9 May, 2024; v1 submitted 29 November, 2020; originally announced November 2020.

    Comments: This is the extended technical report of the work accepted at IFIP Networking 2024

  9. arXiv:2007.00764  [pdf, other

    cs.CR

    Cross-Layer Deanonymization Methods in the Lightning Protocol

    Authors: Matteo Romiti, Friedhelm Victor, Pedro Moreno-Sanchez, Peter Sebastian Nordholt, Bernhard Haslhofer, Matteo Maffei

    Abstract: Bitcoin (BTC) pseudonyms (layer 1) can effectively be deanonymized using heuristic clustering techniques. However, while performing transactions off-chain (layer 2) in the Lightning Network (LN) seems to enhance privacy, a systematic analysis of the anonymity and privacy leakages due to the interaction between the two layers is missing. We present clustering heuristics that group BTC addresses, ba… ▽ More

    Submitted 10 February, 2021; v1 submitted 1 July, 2020; originally announced July 2020.

    Comments: 30 pages, 9 figures, Financial Cryptography and Data Security 2021 https://fc21.ifca.ai/

  10. arXiv:2005.06227  [pdf, other

    cs.PL cs.CR

    eThor: Practical and Provably Sound Static Analysis of Ethereum Smart Contracts

    Authors: Clara Schneidewind, Ilya Grishchenko, Markus Scherer, Matteo Maffei

    Abstract: Ethereum has emerged as the most popular smart contract development platform, with hundreds of thousands of contracts stored on the blockchain and covering a variety of application scenarios, such as auctions, trading platforms, and so on. Given their financial nature, security vulnerabilities may lead to catastrophic consequences and, even worse, they can be hardly fixed as data stored on the blo… ▽ More

    Submitted 13 May, 2020; originally announced May 2020.

    Comments: Accepted for CCS 2020

  11. arXiv:2001.10405  [pdf, ps, other

    cs.CR

    Language-Based Web Session Integrity

    Authors: Stefano Calzavara, Riccardo Focardi, Niklas Grimm, Matteo Maffei, Mauro Tempesta

    Abstract: Session management is a fundamental component of web applications: despite the apparent simplicity, correctly implementing web sessions is extremely tricky, as witnessed by the large number of existing attacks. This motivated the design of formal methods to rigorously reason about web session security which, however, are not supported at present by suitable automated verification techniques. In th… ▽ More

    Submitted 2 June, 2020; v1 submitted 28 January, 2020; originally announced January 2020.

  12. arXiv:1911.09148  [pdf, other

    cs.CR

    Concurrency and Privacy with Payment-Channel Networks

    Authors: Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Srivatsan Ravi

    Abstract: Permissionless blockchains protocols such as Bitcoin are inherently limited in transaction throughput and latency. Current efforts to address this key issue focus on off-chain payment channels that can be combined in a Payment-Channel Network (PCN) to enable an unlimited number of payments without requiring to access the blockchain other than to register the initial and final capacity of each chan… ▽ More

    Submitted 20 November, 2019; originally announced November 2019.

  13. arXiv:1906.09899  [pdf, ps, other

    cs.LO

    Verifying Relational Properties using Trace Logic

    Authors: Gilles Barthe, Renate Eilers, Pamina Georgiou, Bernhard Gleiss, Laura Kovacs, Matteo Maffei

    Abstract: We present a logical framework for the verification of relational properties in imperative programs. Our work is motivated by relational properties which come from security applications and often require reasoning about formulas with quantifier-alternations. Our framework reduces verification of relational properties of imperative programs to a validity problem into trace logic, an expressive inst… ▽ More

    Submitted 12 August, 2019; v1 submitted 24 June, 2019; originally announced June 2019.

  14. arXiv:1806.09111  [pdf, other

    cs.CR

    WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring

    Authors: Stefano Calzavara, Riccardo Focardi, Matteo Maffei, Clara Schneidewind, Marco Squarcina, Mauro Tempesta

    Abstract: We present WPSE, a browser-side security monitor for web protocols designed to ensure compliance with the intended protocol flow, as well as confidentiality and integrity properties of messages. We formally prove that WPSE is expressive enough to protect web applications from a wide range of protocol implementation bugs and web attacks. We discuss concrete examples of attacks which can be prevente… ▽ More

    Submitted 24 June, 2018; originally announced June 2018.

  15. A Semantic Framework for the Security Analysis of Ethereum smart contracts

    Authors: Ilya Grishchenko, Matteo Maffei, Clara Schneidewind

    Abstract: Smart contracts are programs running on cryptocurrency (e.g., Ethereum) blockchains, whose popularity stem from the possibility to perform financial transactions, such as payments and auctions, in a distributed environment without need for any trusted third party. Given their financial nature, bugs or vulnerabilities in these programs may lead to catastrophic consequences, as witnessed by recent a… ▽ More

    Submitted 23 April, 2018; v1 submitted 23 February, 2018; originally announced February 2018.

    Comments: The EAPLS Best Paper Award at ETAPS

    Journal ref: POST 2018: 243-269

  16. arXiv:1708.08340  [pdf, ps, other

    cs.CR cs.PL

    A Type System for Privacy Properties (Technical Report)

    Authors: Véronique Cortier, Niklas Grimm, Joseph Lallemand, Matteo Maffei

    Abstract: Mature push button tools have emerged for checking trace properties (e.g. secrecy or authentication) of security protocols. The case of indistinguishability-based privacy properties (e.g. ballot privacy or anonymity) is more complex and constitutes an active research topic with several recent propositions of techniques and tools. We explore a novel approach based on type systems and provide a (sou… ▽ More

    Submitted 28 August, 2017; originally announced August 2017.

  17. HornDroid: Practical and Sound Static Analysis of Android Applications by SMT Solving

    Authors: Stefano Calzavara, Ilya Grishchenko, Matteo Maffei

    Abstract: We present HornDroid, a new tool for the static analysis of information flow properties in Android applications. The core idea underlying HornDroid is to use Horn clauses for soundly abstracting the semantics of Android applications and to express security properties as a set of proof obligations that are automatically discharged by an off-the-shelf SMT solver. This approach makes it possible to f… ▽ More

    Submitted 25 July, 2017; originally announced July 2017.

    Comments: In Proceedings of 1st IEEE European Symposium on Security and Privacy (IEEE EuroS&P 2016)

  18. arXiv:1705.10482  [pdf, other

    cs.CR cs.PL

    A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android Applications

    Authors: Stefano Calzavara, Ilya Grishchenko, Adrien Koutsos, Matteo Maffei

    Abstract: The present paper proposes the first static analysis for Android applications which is both flow-sensitive on the heap abstraction and provably sound with respect to a rich formal model of the Android platform. We formulate the analysis as a set of Horn clauses defining a sound over-approximation of the semantics of the Android application to analyse, borrowing ideas from recency abstraction and e… ▽ More

    Submitted 12 June, 2017; v1 submitted 30 May, 2017; originally announced May 2017.

  19. arXiv:1703.00055  [pdf, other

    cs.PL cs.CR

    A Monadic Framework for Relational Verification: Applied to Information Security, Program Equivalence, and Optimizations

    Authors: Niklas Grimm, Kenji Maillard, Cédric Fournet, Catalin Hritcu, Matteo Maffei, Jonathan Protzenko, Tahina Ramananandro, Aseem Rastogi, Nikhil Swamy, Santiago Zanella-Béguelin

    Abstract: Relational properties describe multiple runs of one or more programs. They characterize many useful notions of security, program refinement, and equivalence for programs with diverse computational effects, and they have received much attention in the recent literature. Rather than develo** separate tools for special classes of effects and relational properties, we advocate using a general purpos… ▽ More

    Submitted 12 October, 2019; v1 submitted 28 February, 2017; originally announced March 2017.

    Comments: CPP'18 extended version with the missing ERC acknowledgement