Generalized probabilistic satisfiability and applications to modelling attackers with side-channel capabilities

被引:2
|
作者
Caleiro, Carlos [1 ]
Casal, Filipe [2 ]
Mordido, Andreia [3 ]
机构
[1] Univ Lisbon, Inst Super Tecn, Dept Math, SQIG Inst Telecomunicacoes, Lisbon, Portugal
[2] Univ Lisbon, Inst Super Menlo, Dept Math, Ctr Matemat Aplicacoes Fundamentais & Invest Oper, Lisbon, Portugal
[3] Univ Lisbon, Fac Ciencias, LASIGE, Lisbon, Portugal
关键词
Probabilistic satisfiability; GenPSAT; GGenPSAT; Phase transition; Side-channel attacks; LOGIC;
D O I
10.1016/j.tcs.2019.02.021
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We analyze a generalized probabilistic satisfiability problem (GenPSAT) which consists in deciding the satisfiability of linear inequalities involving probabilities of classical propositional formulas. GenPSAT is proved to be NP-complete and we present a polynomial reduction to Mixed-Integer Programming. Capitalizing on this translation, we implement and test a solver for the GenPSAT problem. As previously observed for many other NP-complete problems, we are able to detect a phase transition behaviour for GenPSAT. We also describe GGenPSAT, which generalizes GenPSAT by allowing Boolean combinations of linear inequalities involving probabilities of classical propositional formulas which we use to develop applications in information security. Namely, in the context of cryptographic protocols, we model classes of attackers with side-channel capabilities, and study the problem of deciding whether a formula is perfectly masked in the presence of such attackers. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:39 / 62
页数:24
相关论文
共 38 条
  • [31] Deep learning mitigates but does not annihilate the need of aligned traces and a generalized ResNet model for side-channel attacks
    Zhou, Yuanyuan
    Standaert, Francois-Xavier
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (01) : 85 - 95
  • [32] Deep learning mitigates but does not annihilate the need of aligned traces and a generalized ResNet model for side-channel attacks
    Yuanyuan Zhou
    François-Xavier Standaert
    Journal of Cryptographic Engineering, 2020, 10 : 85 - 95
  • [33] A Memory-Deduplication Side-Channel Attack to Detect Applications in Co-Resident Virtual Machines
    Lindemann, Jens
    Fischer, Mathias
    33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2018, : 183 - 192
  • [34] Logic State Imaging From FA Techniques for Special Applications to One of the Most Powerful Hardware Security Side-Channel Threats
    Boit, Christian
    Kiyan, Tuba
    Krachenfels, Thilo
    Seifert, Jean-Pierre
    2020 IEEE INTERNATIONAL SYMPOSIUM ON THE PHYSICAL AND FAILURE ANALYSIS OF INTEGRATED CIRCUITS (IPFA), 2020,
  • [35] Power Side-Channel Attacks on Crypto-Core Based on RISC-V ISA for High-Security Applications
    Ignatius, Titu Mary
    Singha, Thockchom Birjit
    Palathinkal, Roy Paily
    IEEE ACCESS, 2024, 12 : 150230 - 150248
  • [36] A Compact and Low Power RO PUF with High Resilience to the EM Side-Channel Attack and the SVM Modelling Attack of Wireless Sensor Networks
    Cao, Yuan
    Zhao, Xiaojin
    Ye, Wenbin
    Han, Qingbang
    Pan, Xiaofang
    SENSORS, 2018, 18 (02)
  • [37] Estimating the Signal-to-Noise Ratio Under Repeated Sampling of the Same Centered Signal: Applications to Side-Channel Attacks on a Cryptoprocessor
    Ducharme, Gilles R.
    Maurine, Philippe
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2018, 64 (09) : 6333 - 6339
  • [38] A Single-Inductor-Triple-Output Buck DC-DC Converter With Electromagnetic Gated Low Dropouts for Higher Resistance to Electromagnetic and Power Side-Channel Attacks With 3B Minimum Traces to Disclosure Improvement in Internet of Things Applications
    Hsu, Ya-Ting
    Chung, Kai-Cheng
    Ouyang, Yu-Jheng
    Chen, Ke-Horng
    Zheng, Kuo-Lin
    Lin, Ying-Hsi
    Lin, Shian-Ru
    Tsai, Tsung-Yen
    IEEE SOLID-STATE CIRCUITS LETTERS, 2023, 6 : 89 - 92