Skip to main content

Showing 1–11 of 11 results for author: Potet, M

Searching in archive cs. Search in all archives.
.
  1. Combining static analysis and dynamic symbolic execution in a toolchain to detect fault injection vulnerabilities

    Authors: Guilhem Lacombe, David Feliot, Etienne Boespflug, Marie-Laure Potet

    Abstract: Certification through auditing allows to ensure that critical embedded systems are secure. This entails reviewing their critical components and checking for dangerous execution paths. This latter task requires the use of specialized tools which allow to explore and replay executions but are also difficult to use effectively within the context of the audit, where time and knowledge of the code are… ▽ More

    Submitted 7 March, 2023; originally announced March 2023.

    Comments: Journal of Cryptographic Engineering, 2023

  2. arXiv:2303.01885  [pdf, ps, other

    cs.CR

    A tool assisted methodology to harden programs against multi-faults injections

    Authors: Etienne Boespflug, Abderrahmane Bouguern, Laurent Mounier, Marie-Laure Potet

    Abstract: Fault attacks consist in changing the program behavior by injecting faults at run-time in order to break some expected security properties. Applications are hardened against fault attack adding countermeasures. According to the state of the art, applications must now be protected against multi-fault injection. As a consequence develo** applications which are robust becomes a very challenging tas… ▽ More

    Submitted 3 March, 2023; originally announced March 2023.

  3. BAXMC: a CEGAR approach to Max#SAT

    Authors: Thomas Vigouroux, Cristian Ene, David Monniaux, Laurent Mounier, Marie-Laure Potet

    Abstract: Max#SAT is an important problem with multiple applications in security and program synthesis that is proven hard to solve. It is defined as: given a parameterized quantifier-free propositional formula compute parameters such that the number of models of the formula is maximal. As an extension, the formula can include an existential prefix. We propose a CEGAR-based algorithm and refinements thereof… ▽ More

    Submitted 6 February, 2023; v1 submitted 2 November, 2022; originally announced November 2022.

    Comments: FMCAD 2022, Oct 2022, Trente, Italy

  4. arXiv:2102.07485  [pdf, other

    cs.PL

    Interface Compliance of Inline Assembly: Automatically Check, Patch and Refine

    Authors: Frédéric Recoules, Sébastien Bardin, Richard Bonichon, Matthieu Lemerre, Laurent Mounier, Marie-Laure Potet

    Abstract: Inline assembly is still a common practice in low-level C programming, typically for efficiency reasons or for accessing specific hardware resources. Such embedded assembly codes in the GNU syntax (supported by major compilers such as GCC, Clang and ICC) have an interface specifying how the assembly codes interact with the C environment. For simplicity reasons, the compiler treats GNU inline assem… ▽ More

    Submitted 15 February, 2021; originally announced February 2021.

  5. Output-sensitive Information flow analysis

    Authors: Cristian Ene, Laurent Mounier, Marie-Laure Potet

    Abstract: Constant-time programming is a countermeasure to prevent cache based attacks where programs should not perform memory accesses that depend on secrets. In some cases this policy can be safely relaxed if one can prove that the program does not leak more information than the public outputs of the computation. We propose a novel approach for verifying constant-time programming based on a new informati… ▽ More

    Submitted 11 February, 2021; v1 submitted 20 September, 2019; originally announced September 2019.

    Journal ref: Logical Methods in Computer Science, Volume 17, Issue 1 (February 12, 2021) lmcs:5779

  6. arXiv:1903.06407  [pdf, other

    cs.PL

    Get rid of inline assembly through verification-oriented lifting

    Authors: Frédéric Recoules, Sébastien Bardin, Richard Bonichon, Laurent Mounier, Marie-Laure Potet

    Abstract: Formal methods for software development have made great strides in the last two decades, to the point that their application in safety-critical embedded software is an undeniable success. Their extension to non-critical software is one of the notable forthcoming challenges. For example, C programmers regularly use inline assembly for low-level optimizations and system primitives. This usually resu… ▽ More

    Submitted 1 October, 2019; v1 submitted 15 March, 2019; originally announced March 2019.

  7. arXiv:1802.05616  [pdf, ps, other

    cs.LO

    Model Generation for Quantified Formulas: A Taint-Based Approach

    Authors: Benjamin Farinier, Sébastien Bardin, Richard Bonichon, Marie-Laure Potet

    Abstract: We focus in this paper on generating models of quantified first-order formulas over built-in theories, which is paramount in software verification and bug finding. While standard methods are either geared toward proving the absence of solution or targeted to specific theories, we propose a generic approach based on a reduction to the quantifier-free case. Our technique allows thus to reuse all the… ▽ More

    Submitted 15 February, 2018; originally announced February 2018.

  8. arXiv:1305.3883  [pdf, ps, other

    cs.CR

    Combining Static and Dynamic Analysis for Vulnerability Detection

    Authors: Sanjay Rawat, Dumitru Ceara, Laurent Mounier, Marie-Laure Potet

    Abstract: In this paper, we present a hybrid approach for buffer overflow detection in C code. The approach makes use of static and dynamic analysis of the application under investigation. The static part consists in calculating taint dependency sequences (TDS) between user controlled inputs and vulnerable statements. This process is akin to program slice of interest to calculate tainted data- and control-f… ▽ More

    Submitted 16 May, 2013; originally announced May 2013.

    Comments: There are 15 pages with 1 figure

  9. arXiv:1004.2178  [pdf, ps, other

    cs.SE

    GénéSyst : Génération d'un système de transitions étiquetées à partir d'une spécification B événementiel

    Authors: Xavier Morselli, Marie-Laure Potet, Nicolas Stouls

    Abstract: The most expensive source of errors and the more difficult to detect in a formal development is the error during specification. Hence, the first step in a formal development usually consists in exhibiting the set of all behaviors of the specification, for instance with an automaton. Starting from this observation, many researches are about the generation of a B machine from a behavioral specificat… ▽ More

    Submitted 13 April, 2010; originally announced April 2010.

    Journal ref: Approches Formelles dans l'Assistance au Développement de Logiciels (AFADL'04), besançon : France (2004)

  10. arXiv:1004.1472  [pdf, ps, other

    cs.LO cs.CR

    GeneSyst: a Tool to Reason about Behavioral Aspects of B Event Specifications. Application to Security Properties.

    Authors: Didier Bert, Marie-Laure Potet, Nicolas Stouls

    Abstract: In this paper, we present a method and a tool to build symbolic labelled transition systems from B specifications. The tool, called GeneSyst, can take into account refinement levels and can visualize the decomposition of abstract states in concrete hierarchical states. The resulting symbolic transition system represents all the behaviors of the initial B event system. So, it can be used to reason… ▽ More

    Submitted 9 April, 2010; originally announced April 2010.

    Journal ref: Formal Specification and Development in Z and B, 4th International Conference of B and Z Users, Guildford : United Kingdom (2005)

  11. arXiv:1004.1460  [pdf, ps, other

    cs.CR cs.LO

    Security Policy Enforcement Through Refinement Process

    Authors: Nicolas Stouls, Marie-Laure Potet

    Abstract: In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process. We argue that it is possible to build a formal link between concrete and abstract terms, which can be dynamically computed from the environment data. In order to progressively introduce configuration data and then simplify the proof obligation… ▽ More

    Submitted 9 April, 2010; originally announced April 2010.

    Journal ref: B 2007, besançon : France (2007)