Skip to main content

Showing 1–25 of 25 results for author: Bardin, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2501.17740  [pdf, other

    cs.CR

    Attacker Control and Bug Prioritization

    Authors: Guilhem Lacombe, Sébastien Bardin

    Abstract: As bug-finding methods improve, bug-fixing capabilities are exceeded, resulting in an accumulation of potential vulnerabilities. There is thus a need for efficient and precise bug prioritization based on exploitability. In this work, we explore the notion of control of an attacker over a vulnerability's parameters, which is an often overlooked factor of exploitability. We show that taint as well a… ▽ More

    Submitted 31 March, 2025; v1 submitted 29 January, 2025; originally announced January 2025.

    Comments: 21 pages, 30 figures, USENIX Security 2025

  2. arXiv:2310.08153  [pdf, other

    cs.CR

    A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic Libraries

    Authors: Antoine Geimer, Mathéo Vergnolle, Frédéric Recoules, Lesly-Ann Daniel, Sébastien Bardin, Clémentine Maurice

    Abstract: To protect cryptographic implementations from side-channel vulnerabilities, developers must adopt constant-time programming practices. As these can be error-prone, many side-channel detection tools have been proposed. Despite this, such vulnerabilities are still manually found in cryptographic libraries. While a recent paper by Jancar et al. shows that developers rarely perform side-channel detect… ▽ More

    Submitted 12 October, 2023; originally announced October 2023.

    Comments: 15 pages, Accepted to ACM CCS 2023

    ACM Class: A.1; D.2.4

  3. arXiv:2308.13588  [pdf, other

    cs.HC cs.LG

    GeoExplainer: A Visual Analytics Framework for Spatial Modeling Contextualization and Report Generation

    Authors: Fan Lei, Yuxin Ma, Stewart Fotheringham, Elizabeth Mack, Ziqi Li, Mehak Sachdeva, Sarah Bardin, Ross Maciejewski

    Abstract: Geographic regression models of various descriptions are often applied to identify patterns and anomalies in the determinants of spatially distributed observations. These types of analyses focus on answering why questions about underlying spatial phenomena, e.g., why is crime higher in this locale, why do children in one school district outperform those in another, etc.? Answers to these questions… ▽ More

    Submitted 25 August, 2023; originally announced August 2023.

    Comments: 12 pages, 7 figures, accepted by IEEE VIS 2023

  4. arXiv:2302.12108  [pdf, other

    cs.CR cs.AR

    ProSpeCT: Provably Secure Speculation for the Constant-Time Policy (Extended version)

    Authors: Lesly-Ann Daniel, Marton Bognar, Job Noorman, Sébastien Bardin, Tamara Rezk, Frank Piessens

    Abstract: We propose ProSpeCT, a generic formal processor model providing provably secure speculation for the constant-time policy. For constant-time programs under a non-speculative semantics, ProSpeCT guarantees that speculative and out-of-order execution cause no microarchitectural leaks. This guarantee is achieved by tracking secrets in the processor pipeline and ensuring that they do not influence the… ▽ More

    Submitted 11 August, 2023; v1 submitted 23 February, 2023; originally announced February 2023.

    Comments: Technical report for our paper accepted at the 32nd USENIX Security Symposium (2023), 56 pages

  5. arXiv:2212.05244  [pdf, other

    cs.PL cs.CR cs.LO

    A Quantitative Flavour of Robust Reachability

    Authors: Sébastien Bardin, Guillaume Girol

    Abstract: Many software analysis techniques attempt to determine whether bugs are reachable, but for security purpose this is only part of the story as it does not indicate whether the bugs found could be easily triggered by an attacker. The recently introduced notion of robust reachability aims at filling this gap by distinguishing the input controlled by the attacker from those that are not. Yet, this qua… ▽ More

    Submitted 10 December, 2022; originally announced December 2022.

  6. arXiv:2210.13063  [pdf, other

    cs.CR

    Scalable Program Clone Search Through Spectral Analysis

    Authors: Tristan Benoit, Jean-Yves Marion, Sébastien Bardin

    Abstract: We consider the problem of program clone search, i.e. given a target program and a repository of known programs (all in executable format), the goal is to find the program in the repository most similar to the target program - with potential applications in terms of reverse engineering, program clustering, malware lineage and software theft detection. Recent years have witnessed a blooming in code… ▽ More

    Submitted 31 August, 2023; v1 submitted 24 October, 2022; originally announced October 2022.

  7. arXiv:2209.01129  [pdf, other

    cs.CR

    Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to Constant-Time and Secret-Erasure

    Authors: Lesly-Ann Daniel, Sébastien Bardin, Tamara Rezk

    Abstract: This paper tackles the problem of designing efficient binary-level verification for a subset of information flow properties encompassing constant-time and secret-erasure. These properties are crucial for cryptographic implementations, but are generally not preserved by compilers. Our proposal builds on relational symbolic execution enhanced with new optimizations dedicated to information flow and… ▽ More

    Submitted 2 September, 2022; originally announced September 2022.

    Comments: Technical report, corresponding paper accepted to Transactions on Privacy and Security 2022 (TOPS), 54 pages. arXiv admin note: substantial text overlap with arXiv:1912.08788

  8. arXiv:2109.06493  [pdf, other

    cs.PL

    Formal Methods for Quantum Programs: A Survey

    Authors: Christophe Chareton, Sébastien Bardin, Dongho Lee, Benoît Valiron, Renaud Vilmart, Zhaowei Xu

    Abstract: While recent progress in quantum hardware open the door for significant speedup in certain key areas (cryptography, biology, chemistry, optimization, machine learning, etc), quantum algorithms are still hard to implement right, and the validation of such quantum programs is achallenge. Moreover, importing the testing and debugging practices at use in classical programming is extremely difficult in… ▽ More

    Submitted 8 April, 2022; v1 submitted 14 September, 2021; originally announced September 2021.

  9. arXiv:2102.07485  [pdf, other

    cs.PL

    Interface Compliance of Inline Assembly: Automatically Check, Patch and Refine

    Authors: Frédéric Recoules, Sébastien Bardin, Richard Bonichon, Matthieu Lemerre, Laurent Mounier, Marie-Laure Potet

    Abstract: Inline assembly is still a common practice in low-level C programming, typically for efficiency reasons or for accessing specific hardware resources. Such embedded assembly codes in the GNU syntax (supported by major compilers such as GCC, Clang and ICC) have an interface specifying how the assembly codes interact with the C environment. For simplicity reasons, the compiler treats GNU inline assem… ▽ More

    Submitted 15 February, 2021; originally announced February 2021.

  10. arXiv:2102.04805  [pdf, ps, other

    cs.CR cs.AI

    AI-based Blackbox Code Deobfuscation: Understand, Improve and Mitigate

    Authors: Grégoire Menguy, Sébastien Bardin, Richard Bonichon, Cauim de Souza Lima

    Abstract: Code obfuscation aims at protecting Intellectual Property and other secrets embedded into software from being retrieved. Recent works leverage advances in artificial intelligence with the hope of getting blackbox deobfuscators completely immune to standard (whitebox) protection mechanisms. While promising, this new field of AI-based blackbox deobfuscation is still in its infancy. In this article w… ▽ More

    Submitted 9 February, 2021; originally announced February 2021.

  11. No Crash, No Exploit: Automated Verification of Embedded Kernels

    Authors: Olivier Nicole, Matthieu Lemerre, Sébastien Bardin, Xavier Rival

    Abstract: The kernel is the most safety- and security-critical component of many computer systems, as the most severe bugs lead to complete system crash or exploit. It is thus desirable to guarantee that a kernel is free from these bugs using formal methods, but the high cost and expertise required to do so are deterrent to wide applicability. We propose a method that can verify both absence of runtime erro… ▽ More

    Submitted 21 May, 2021; v1 submitted 30 November, 2020; originally announced November 2020.

    Comments: Published in IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS'21)

  12. arXiv:2003.08915  [pdf, ps, other

    cs.CR

    Automatically Proving Microkernels Free from Privilege Escalation from their Executable

    Authors: Olivier Nicole, Matthieu Lemerre, Sébastien Bardin, Xavier Rival

    Abstract: Operating system kernels are the security keystone of most computer systems, as they provide the core protection mechanisms. Kernels are in particular responsible for their own security, i.e. they must prevent untrusted user tasks from reaching their level of privilege. We demonstrate that proving such absence of privilege escalation is a pre-requisite for any definitive security proof of the kern… ▽ More

    Submitted 19 March, 2020; originally announced March 2020.

    Comments: 19 pages, 11 figures, submitted to IEEE Symposium on Security and Privacy 2021

  13. A Deductive Verification Framework for Circuit-building Quantum Programs

    Authors: Christophe Chareton, Sébastien Bardin, François Bobot, Valentin Perrelle, Benoit Valiron

    Abstract: While recent progress in quantum hardware open the door for significant speedup in certain key areas, quantum algorithms are still hard to implement right, and the validation of such quantum programs is a challenge. Early attempts either suffer from the lack of automation or parametrized reasoning, or target high-level abstract algorithm description languages far from the current de facto consensu… ▽ More

    Submitted 26 July, 2020; v1 submitted 12 March, 2020; originally announced March 2020.

  14. arXiv:2002.10751  [pdf, other

    cs.CR

    Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities

    Authors: Manh-Dung Nguyen, Sébastien Bardin, Richard Bonichon, Roland Groz, Matthieu Lemerre

    Abstract: Directed fuzzing focuses on automatically testing specific parts of the code by taking advantage of additional information such as (partial) bug stack trace, patches or risky operations. Key applications include bug reproduction, patch testing and static analysis report verification. Although directed fuzzing has received a lot of attention recently, hard-to-detect vulnerabilities such as Use-Afte… ▽ More

    Submitted 17 August, 2020; v1 submitted 25 February, 2020; originally announced February 2020.

    Comments: The long version of paper appeared in the 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020)

  15. arXiv:1912.08788  [pdf, other

    cs.CR

    Binsec/Rel: Efficient Relational Symbolic Execution for Constant-Time at Binary-Level

    Authors: Lesly-Ann Daniel, Sébastien Bardin, Tamara Rezk

    Abstract: The constant-time programming discipline (CT) is an efficient countermeasure against timing side-channel attacks, requiring the control flow and the memory accesses to be independent from the secrets. Yet, writing CT code is challenging as it demands to reason about pairs of execution traces (2- hypersafety property) and it is generally not preserved by the compiler, requiring binary-level analysi… ▽ More

    Submitted 11 July, 2020; v1 submitted 18 December, 2019; originally announced December 2019.

    Comments: 18 pages, 7 figures, accepted at IEEE Symposium on Security and Privacy 2020

  16. arXiv:1908.01549  [pdf, other

    cs.CR

    How to Kill Symbolic Deobfuscation for Free; or Unleashing the Potential of Path-Oriented Protections

    Authors: Mathilde Ollivier, Sébastien Bardin, Richard Bonichon, Jean-Yves Marion

    Abstract: Code obfuscation is a major tool for protecting software intellectual property from attacks such as reverse engineering or code tampering. Yet, recently proposed (automated) attacks based on Dynamic Symbolic Execution (DSE) shows very promising results, hence threatening software integrity. Current defenses are not fully satisfactory, being either not efficient against symbolic reasoning, or affec… ▽ More

    Submitted 7 August, 2019; v1 submitted 5 August, 2019; originally announced August 2019.

    Comments: 17 pages + 7 pages of references and annexes

    MSC Class: D.m

  17. arXiv:1903.06407  [pdf, other

    cs.PL

    Get rid of inline assembly through verification-oriented lifting

    Authors: Frédéric Recoules, Sébastien Bardin, Richard Bonichon, Laurent Mounier, Marie-Laure Potet

    Abstract: Formal methods for software development have made great strides in the last two decades, to the point that their application in safety-critical embedded software is an undeniable success. Their extension to non-critical software is one of the notable forthcoming challenges. For example, C programmers regularly use inline assembly for low-level optimizations and system primitives. This usually resu… ▽ More

    Submitted 1 October, 2019; v1 submitted 15 March, 2019; originally announced March 2019.

  18. arXiv:1802.05616  [pdf, ps, other

    cs.LO

    Model Generation for Quantified Formulas: A Taint-Based Approach

    Authors: Benjamin Farinier, Sébastien Bardin, Richard Bonichon, Marie-Laure Potet

    Abstract: We focus in this paper on generating models of quantified first-order formulas over built-in theories, which is paramount in software verification and bug finding. While standard methods are either geared toward proving the absence of solution or targeted to specific theories, we propose a generic approach based on a reduction to the quantifier-free case. Our technique allows thus to reuse all the… ▽ More

    Submitted 15 February, 2018; originally announced February 2018.

  19. arXiv:1712.10058  [pdf, ps, other

    cs.SE

    Abstract Interpretation using a Language of Symbolic Approximation

    Authors: Matthieu Lemerre, Sébastien Bardin

    Abstract: The traditional abstract domain framework for imperative programs suffers from several shortcomings; in particular it does not allow precise symbolic abstractions. To solve these problems, we propose a new abstract interpretation framework, based on symbolic expressions used both as an abstraction of the program, and as the input analyzed by abstract domains. We demonstrate new applications of the… ▽ More

    Submitted 28 December, 2017; originally announced December 2017.

  20. Freeing Testers from Polluting Test Objectives

    Authors: Michaël Marcozzi, Sébastien Bardin, Nikolai Kosmatov, Mike Papadakis, Virgile Prevosto, Loïc Correnson

    Abstract: Testing is the primary approach for detecting software defects. A major challenge faced by testers lies in crafting efficient test suites, able to detect a maximum number of bugs with manageable effort. To do so, they rely on coverage criteria, which define some precise test objectives to be covered. However, many common criteria specify a significant number of objectives that occur to be infeasib… ▽ More

    Submitted 29 August, 2017; originally announced August 2017.

    ACM Class: D.2.5; D.2.4

  21. arXiv:1706.09229  [pdf, ps, other

    cs.LO

    CDCL-inspired Word-level Learning for Bit-vector Constraint Solving

    Authors: Zakaria Chihani, François Bobot, Sébastien Bardin

    Abstract: The theory of quantifier-free bit-vectors (QF_BV) is of paramount importance in software verification. The standard approach for satisfiability checking reduces the bit-vector problem to a Boolean problem, leveraging the powerful SAT solving techniques and their conflict-driven clause learning (CDCL) mechanisms. Yet, this bit-level approach loses the structure of the initial bit-vector problem. We… ▽ More

    Submitted 28 June, 2017; originally announced June 2017.

    Comments: 15 pages,3 figures

  22. arXiv:1612.05675  [pdf, other

    cs.CR cs.SE

    Targeting Infeasibility Questions on Obfuscated Codes

    Authors: Robin David, Sébastien Bardin, Jean-Yves Marion

    Abstract: Software deobfuscation is a crucial activity in security analysis and especially, in malware analysis. While standard static and dynamic approaches suffer from well-known shortcomings, Dynamic Symbolic Execution (DSE) has recently been proposed has an interesting alternative, more robust than static analysis and more complete than dynamic analysis. Yet, DSE addresses certain kinds of questions enc… ▽ More

    Submitted 16 December, 2016; originally announced December 2016.

    ACM Class: D.4.6; K.6.5; D.2.4

  23. arXiv:1609.01204  [pdf, other

    cs.SE

    Generic and Effective Specification of Structural Test Objectives

    Authors: Sébastien Bardin, Mickaël Delahaye, Nikolai Kosmatov, Michaël Marcozzi, Virgile Prevosto

    Abstract: While a wide range of different, sometimes heterogeneous test coverage criteria have been proposed, there exists no generic formalism to describe them, and available test automation tools usually support only a small subset of them. We introduce a unified specification language, called HTOL, providing a powerful generic mechanism to define test objectives, which permits encoding numerous existing… ▽ More

    Submitted 19 January, 2017; v1 submitted 5 September, 2016; originally announced September 2016.

    Comments: (updated with additional experiments and details)

    Report number: hal-cea-01357487 ACM Class: D.2.5; D.3.2

  24. arXiv:1312.0200  [pdf, other

    cs.LO cs.AI cs.SE

    A Combined Approach for Constraints over Finite Domains and Arrays

    Authors: Sébastien Bardin, Arnaud Gotlieb

    Abstract: Arrays are ubiquitous in the context of software verification. However, effective reasoning over arrays is still rare in CP, as local reasoning is dramatically ill-conditioned for constraints over arrays. In this paper, we propose an approach combining both global symbolic reasoning and local consistency filtering in order to solve constraint systems involving arrays (with accesses, updates and si… ▽ More

    Submitted 1 December, 2013; originally announced December 2013.

    ACM Class: I.2.3; F.3.1; F.4.1; D.2.4; D.2.5

  25. arXiv:1308.4045  [pdf, ps, other

    cs.SE

    Efficient Leverage of Symbolic ATG Tools to Advanced Coverage Criteria

    Authors: Sébastien Bardin, Nikolai Kosmatov, François Cheynier

    Abstract: Automatic test data generation (ATG) is a major topic in software engineering. In this paper, we seek to bridge the gap between the coverage criteria supported by symbolic ATG tools and the most advanced coverage criteria found in the literature. We define a new testing criterion, label coverage, and prove it to be both expressive and amenable to efficient automation. We propose several innovative… ▽ More

    Submitted 19 August, 2013; originally announced August 2013.

    ACM Class: D.2.5; F.3.1