Zum Hauptinhalt springen

Showing 1–10 of 10 results for author: Erata, F

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.05193  [pdf, other

    cs.CR

    Systematic Use of Random Self-Reducibility against Physical Attacks

    Authors: Ferhat Erata, TingHung Chiu, Anthony Etim, Srilalith Nampally, Tejas Raju, Rajashree Ramu, Ruzica Piskac, Timos Antonopoulos, Wenjie Xiong, Jakub Szefer

    Abstract: This work presents a novel, black-box software-based countermeasure against physical attacks including power side-channel and fault-injection attacks. The approach uses the concept of random self-reducibility and self-correctness to add randomness and redundancy in the execution for protection. Our approach is at the operation level, is not algorithm-specific, and thus, can be applied for protecti… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

  2. A Tool for Automated Reasoning About Traces Based on Configurable Formal Semantics

    Authors: Ferhat Erata, Arda Goknil, Bedir Tekinerdogan, Geylani Kardas

    Abstract: We present Tarski, a tool for specifying configurable trace semantics to facilitate automated reasoning about traces. Software development projects require that various types of traces be modeled between and within development artifacts. For any given artifact (e.g., requirements, architecture models and source code), Tarski allows the user to specify new trace types and their configurable semanti… ▽ More

    Submitted 9 March, 2024; originally announced March 2024.

    Comments: Published in ESEC/FSE 2017: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering

  3. Integrating Static Code Analysis Toolchains

    Authors: Matthias Kern, Ferhat Erata, Markus Iser, Carsten Sinz, Frederic Loiret, Stefan Otten, Eric Sax

    Abstract: This paper proposes an approach for a tool-agnostic and heterogeneous static code analysis toolchain in combination with an exchange format. This approach enhances both traceability and comparability of analysis results. State of the art toolchains support features for either test execution and build automation or traceability between tests, requirements and design information. Our approach combin… ▽ More

    Submitted 9 March, 2024; originally announced March 2024.

    Comments: Published in IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC)

  4. AlloyInEcore: Embedding of First-Order Relational Logic into Meta-Object Facility for Automated Model Reasoning

    Authors: Ferhat Erata, Arda Goknil, Ivan Kurtev, Bedir Tekinerdogan

    Abstract: We present AlloyInEcore, a tool for specifying metamodels with their static semantics to facilitate automated, formal reasoning on models. Software development projects require that software systems be specified in various models (e.g., requirements models, architecture models, test models, and source code). It is crucial to reason about those models to ensure the correct and complete system speci… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

    Comments: Published in ESEC/FSE 2018: Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering

  5. ModelWriter: Text & Model-Synchronized Document Engineering Platform

    Authors: Ferhat Erata, Claire Gardent, Bikash Gyawali, Anastasia Shimorina, Yvan Lussaud, Bedir Tekinerdogan, Geylani Kardas, Anne Monceaux

    Abstract: The ModelWriter platform provides a generic framework for automated traceability analysis. In this paper, we demonstrate how this framework can be used to trace the consistency and completeness of technical documents that consist of a set of System Installation Design Principles used by Airbus to ensure the correctness of aircraft system installation. We show in particular, how the platform allows… ▽ More

    Submitted 2 March, 2024; originally announced March 2024.

    Comments: Published in: 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE)

  6. arXiv:2401.15869  [pdf, other

    cs.CR cs.ET

    Quantum Circuit Reconstruction from Power Side-Channel Attacks on Quantum Computer Controllers

    Authors: Ferhat Erata, Chuanqi Xu, Ruzica Piskac, Jakub Szefer

    Abstract: The interest in quantum computing has grown rapidly in recent years, and with it grows the importance of securing quantum circuits. A novel type of threat to quantum circuits that dedicated attackers could launch are power trace attacks. To address this threat, this paper presents first formalization and demonstration of using power traces to unlock and steal quantum circuit secrets. With access t… ▽ More

    Submitted 28 January, 2024; originally announced January 2024.

    Comments: IACR Transactions on Cryptographic Hardware and Embedded Systems

  7. arXiv:2309.05478  [pdf, other

    cs.CR quant-ph

    Classification of Quantum Computer Fault Injection Attacks

    Authors: Chuanqi Xu, Ferhat Erata, Jakub Szefer

    Abstract: The rapid growth of interest in quantum computing has brought about the need to secure these powerful machines against a range of physical attacks. As qubit counts increase and quantum computers achieve higher levels of fidelity, their potential to execute novel algorithms and generate sensitive intellectual property becomes more promising. However, there is a significant gap in our understanding… ▽ More

    Submitted 11 September, 2023; originally announced September 2023.

    Comments: 7 pages, 4 figures

  8. arXiv:2304.03315  [pdf, other

    cs.CR quant-ph

    Exploration of Quantum Computer Power Side-Channels

    Authors: Chuanqi Xu, Ferhat Erata, Jakub Szefer

    Abstract: With the rapidly growing interest in quantum computing also grows the importance of securing these quantum computers from various physical attacks. Constantly increasing qubit counts and improvements to the fidelity of the quantum computers hold great promise for the ability of these computers to run novel algorithms with highly sensitive intellectual property. However, in today's cloud-based quan… ▽ More

    Submitted 9 May, 2023; v1 submitted 6 April, 2023; originally announced April 2023.

    Comments: 17 pages, 11 figures. Main changes are the updated "Defenses" Section and text edits on other sections

  9. Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic Code

    Authors: Ferhat Erata, Ruzica Piskac, Victor Mateu, Jakub Szefer

    Abstract: Although cryptographic algorithms may be mathematically secure, it is often possible to leak secret information from the implementation of the algorithms. Timing and power side-channel vulnerabilities are some of the most widely considered threats to cryptographic algorithm implementations. Timing vulnerabilities may be easier to detect and exploit, and all high-quality cryptographic code today sh… ▽ More

    Submitted 4 April, 2023; originally announced April 2023.

  10. ETAP: Energy-aware Timing Analysis of Intermittent Programs

    Authors: Ferhat Erata, Arda Goknil, Eren Yıldız, Kasım Sinan Yıldırım, Ruzica Piskac, Jakub Szefer, Gökçin Sezgin

    Abstract: Energy harvesting battery-free embedded devices rely only on ambient energy harvesting that enables stand-alone and sustainable IoT applications. These devices execute programs when the harvested ambient energy in their energy reservoir is sufficient to operate and stop execution abruptly (and start charging) otherwise. These intermittent programs have varying timing behavior under different energ… ▽ More

    Submitted 3 February, 2022; v1 submitted 27 January, 2022; originally announced January 2022.

    Comments: Corrected typos in the previous submission