Generalized probabilistic satisfiability and applications to modelling attackers with side-channel capabilities

被引:2
|
作者
Caleiro, Carlos [1 ]
Casal, Filipe [2 ]
Mordido, Andreia [3 ]
机构
[1] Univ Lisbon, Inst Super Tecn, Dept Math, SQIG Inst Telecomunicacoes, Lisbon, Portugal
[2] Univ Lisbon, Inst Super Menlo, Dept Math, Ctr Matemat Aplicacoes Fundamentais & Invest Oper, Lisbon, Portugal
[3] Univ Lisbon, Fac Ciencias, LASIGE, Lisbon, Portugal
关键词
Probabilistic satisfiability; GenPSAT; GGenPSAT; Phase transition; Side-channel attacks; LOGIC;
D O I
10.1016/j.tcs.2019.02.021
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We analyze a generalized probabilistic satisfiability problem (GenPSAT) which consists in deciding the satisfiability of linear inequalities involving probabilities of classical propositional formulas. GenPSAT is proved to be NP-complete and we present a polynomial reduction to Mixed-Integer Programming. Capitalizing on this translation, we implement and test a solver for the GenPSAT problem. As previously observed for many other NP-complete problems, we are able to detect a phase transition behaviour for GenPSAT. We also describe GGenPSAT, which generalizes GenPSAT by allowing Boolean combinations of linear inequalities involving probabilities of classical propositional formulas which we use to develop applications in information security. Namely, in the context of cryptographic protocols, we model classes of attackers with side-channel capabilities, and study the problem of deciding whether a formula is perfectly masked in the presence of such attackers. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:39 / 62
页数:24
相关论文
共 38 条
  • [1] On the Detection of Adaptive Side-channel Attackers in Cloud Environments
    Alhulayyil, Hisham
    Khalil, Karim
    Krishnamurthy, Srikanth, V
    Cansever, Derya
    La Porta, Thomas
    Swami, Ananthram
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [2] Symbolic Side-Channel Analysis for Probabilistic Programs
    Malacaria, Pasquale
    Khouzani, M. H. R.
    Pasareanu, Corina S.
    Quoc-Sang Phan
    Luckow, Kasper
    IEEE 31ST COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2018), 2018, : 313 - 327
  • [3] Aiding side-channel attacks on cryptographic software with satisfiability-based analysis
    Potlapally, Nachiketh R.
    Raghunathan, Anand
    Ravi, Srivaths
    Jha, Niraj K.
    Lee, Ruby B.
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2007, 15 (04) : 465 - 470
  • [4] Satisfiability-based framework for enabling side-channel attacks on cryptographic software
    Potlapally, Nachiketh R.
    Raghunathan, Anand
    Ravi, Srivaths
    Jha, Niraj K.
    Lee, Ruby B.
    2006 DESIGN AUTOMATION AND TEST IN EUROPE, VOLS 1-3, PROCEEDINGS, 2006, : 1353 - +
  • [5] Automated Formal Analysis of Side-Channel Attacks on Probabilistic Systems
    Novakovic, Chris
    Parker, David
    COMPUTER SECURITY - ESORICS 2019, PT I, 2019, 11735 : 319 - 337
  • [6] ABBY: Automating leakage modelling for side-channel analysis
    Bazangani, Omid
    Iooss, Alexandre
    Buhan, Ileana
    Batina, Lejla
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 231 - 244
  • [7] Pinpointing side-channel information leaks in web applications
    Mather, Luke
    Oswald, Elisabeth
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2012, 2 (03) : 161 - 177
  • [8] Applications of machine learning techniques in side-channel attacks: a survey
    Hettwer, Benjamin
    Gehrer, Stefan
    Gueneysu, Tim
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (02) : 135 - 162
  • [9] A Method for Identifying eHealth Applications using Side-Channel Information
    Vergutz, Andressa
    Medeiros, Iago
    Rosario, Denis
    Cerqueira, Eduardo
    Santos, Aldri
    Nogueira, Michele
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [10] Sparse Representation of Implicit Flows with Applications to Side-Channel Detection
    Rodrigues, Bruno
    Quintao Pereira, Fernando Magno
    Aranha, Diego F.
    PROCEEDINGS OF THE 25TH INTERNATIONAL CONFERENCE ON COMPILER CONSTRUCTION (CC 2016), 2016, : 110 - 120