Zobrazeno 1 - 10
of 35
pro vyhledávání: '"Bardin, Sebastien"'
Autor:
Geimer, Antoine, Vergnolle, Mathéo, Recoules, Frédéric, Daniel, Lesly-Ann, Bardin, Sébastien, Maurice, Clémentine
To protect cryptographic implementations from side-channel vulnerabilities, developers must adopt constant-time programming practices. As these can be error-prone, many side-channel detection tools have been proposed. Despite this, such vulnerabiliti
Externí odkaz:
http://arxiv.org/abs/2310.08153
Autor:
Daniel, Lesly-Ann, Bognar, Marton, Noorman, Job, Bardin, Sébastien, Rezk, Tamara, Piessens, Frank
We propose ProSpeCT, a generic formal processor model providing provably secure speculation for the constant-time policy. For constant-time programs under a non-speculative semantics, ProSpeCT guarantees that speculative and out-of-order execution ca
Externí odkaz:
http://arxiv.org/abs/2302.12108
Autor:
Bardin, Sébastien, Girol, Guillaume
Many software analysis techniques attempt to determine whether bugs are reachable, but for security purpose this is only part of the story as it does not indicate whether the bugs found could be easily triggered by an attacker. The recently introduce
Externí odkaz:
http://arxiv.org/abs/2212.05244
We consider the problem of program clone search, i.e. given a target program and a repository of known programs (all in executable format), the goal is to find the program in the repository most similar to the target program - with potential applicat
Externí odkaz:
http://arxiv.org/abs/2210.13063
This paper tackles the problem of designing efficient binary-level verification for a subset of information flow properties encompassing constant-time and secret-erasure. These properties are crucial for cryptographic implementations, but are general
Externí odkaz:
http://arxiv.org/abs/2209.01129
Autor:
Chareton, Christophe, Bardin, Sébastien, Lee, Dongho, Valiron, Benoît, Vilmart, Renaud, Xu, Zhaowei
While recent progress in quantum hardware open the door for significant speedup in certain key areas (cryptography, biology, chemistry, optimization, machine learning, etc), quantum algorithms are still hard to implement right, and the validation of
Externí odkaz:
http://arxiv.org/abs/2109.06493
Autor:
Recoules, Frédéric, Bardin, Sébastien, Bonichon, Richard, Lemerre, Matthieu, Mounier, Laurent, Potet, Marie-Laure
Inline assembly is still a common practice in low-level C programming, typically for efficiency reasons or for accessing specific hardware resources. Such embedded assembly codes in the GNU syntax (supported by major compilers such as GCC, Clang and
Externí odkaz:
http://arxiv.org/abs/2102.07485
Code obfuscation aims at protecting Intellectual Property and other secrets embedded into software from being retrieved. Recent works leverage advances in artificial intelligence with the hope of getting blackbox deobfuscators completely immune to st
Externí odkaz:
http://arxiv.org/abs/2102.04805
The kernel is the most safety- and security-critical component of many computer systems, as the most severe bugs lead to complete system crash or exploit. It is thus desirable to guarantee that a kernel is free from these bugs using formal methods, b
Externí odkaz:
http://arxiv.org/abs/2011.15065
Operating system kernels are the security keystone of most computer systems, as they provide the core protection mechanisms. Kernels are in particular responsible for their own security, i.e. they must prevent untrusted user tasks from reaching their
Externí odkaz:
http://arxiv.org/abs/2003.08915