Skip to main content

Showing 1–7 of 7 results for author: Mounier, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2305.10003  [pdf, ps, other

    cs.CR cs.LO

    Function synthesis for maximizing model counting

    Authors: Thomas Vigouroux, Marius Bozga, Cristian Ene, Laurent Mounier

    Abstract: Given a boolean formula $Φ$(X, Y, Z), the Max\#SAT problem asks for finding a partial model on the set of variables X, maximizing its number of projected models over the set of variables Y. We investigate a strict generalization of Max\#SAT allowing dependencies for variables in X, effectively turning it into a synthesis problem. We show that this new problem, called DQMax\#SAT, subsumes both the… ▽ More

    Submitted 12 September, 2023; v1 submitted 17 May, 2023; originally announced May 2023.

  2. arXiv:2303.01885  [pdf, ps, other

    cs.CR

    A tool assisted methodology to harden programs against multi-faults injections

    Authors: Etienne Boespflug, Abderrahmane Bouguern, Laurent Mounier, Marie-Laure Potet

    Abstract: Fault attacks consist in changing the program behavior by injecting faults at run-time in order to break some expected security properties. Applications are hardened against fault attack adding countermeasures. According to the state of the art, applications must now be protected against multi-fault injection. As a consequence develo** applications which are robust becomes a very challenging tas… ▽ More

    Submitted 3 March, 2023; originally announced March 2023.

  3. BAXMC: a CEGAR approach to Max#SAT

    Authors: Thomas Vigouroux, Cristian Ene, David Monniaux, Laurent Mounier, Marie-Laure Potet

    Abstract: Max#SAT is an important problem with multiple applications in security and program synthesis that is proven hard to solve. It is defined as: given a parameterized quantifier-free propositional formula compute parameters such that the number of models of the formula is maximal. As an extension, the formula can include an existential prefix. We propose a CEGAR-based algorithm and refinements thereof… ▽ More

    Submitted 6 February, 2023; v1 submitted 2 November, 2022; originally announced November 2022.

    Comments: FMCAD 2022, Oct 2022, Trente, Italy

  4. arXiv:2102.07485  [pdf, other

    cs.PL

    Interface Compliance of Inline Assembly: Automatically Check, Patch and Refine

    Authors: Frédéric Recoules, Sébastien Bardin, Richard Bonichon, Matthieu Lemerre, Laurent Mounier, Marie-Laure Potet

    Abstract: Inline assembly is still a common practice in low-level C programming, typically for efficiency reasons or for accessing specific hardware resources. Such embedded assembly codes in the GNU syntax (supported by major compilers such as GCC, Clang and ICC) have an interface specifying how the assembly codes interact with the C environment. For simplicity reasons, the compiler treats GNU inline assem… ▽ More

    Submitted 15 February, 2021; originally announced February 2021.

  5. Output-sensitive Information flow analysis

    Authors: Cristian Ene, Laurent Mounier, Marie-Laure Potet

    Abstract: Constant-time programming is a countermeasure to prevent cache based attacks where programs should not perform memory accesses that depend on secrets. In some cases this policy can be safely relaxed if one can prove that the program does not leak more information than the public outputs of the computation. We propose a novel approach for verifying constant-time programming based on a new informati… ▽ More

    Submitted 11 February, 2021; v1 submitted 20 September, 2019; originally announced September 2019.

    Journal ref: Logical Methods in Computer Science, Volume 17, Issue 1 (February 12, 2021) lmcs:5779

  6. arXiv:1903.06407  [pdf, other

    cs.PL

    Get rid of inline assembly through verification-oriented lifting

    Authors: Frédéric Recoules, Sébastien Bardin, Richard Bonichon, Laurent Mounier, Marie-Laure Potet

    Abstract: Formal methods for software development have made great strides in the last two decades, to the point that their application in safety-critical embedded software is an undeniable success. Their extension to non-critical software is one of the notable forthcoming challenges. For example, C programmers regularly use inline assembly for low-level optimizations and system primitives. This usually resu… ▽ More

    Submitted 1 October, 2019; v1 submitted 15 March, 2019; originally announced March 2019.

  7. arXiv:1305.3883  [pdf, ps, other

    cs.CR

    Combining Static and Dynamic Analysis for Vulnerability Detection

    Authors: Sanjay Rawat, Dumitru Ceara, Laurent Mounier, Marie-Laure Potet

    Abstract: In this paper, we present a hybrid approach for buffer overflow detection in C code. The approach makes use of static and dynamic analysis of the application under investigation. The static part consists in calculating taint dependency sequences (TDS) between user controlled inputs and vulnerable statements. This process is akin to program slice of interest to calculate tainted data- and control-f… ▽ More

    Submitted 16 May, 2013; originally announced May 2013.

    Comments: There are 15 pages with 1 figure