Rigorous Analysis

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 135036 Experts worldwide ranked by ideXlab platform

Boris Köpf - One of the best experts on this subject based on the ideXlab platform.

  • PLDI - Rigorous Analysis of software countermeasures against cache attacks
    Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2017
    Co-Authors: Goran Doychev, Boris Köpf
    Abstract:

    CPU caches introduce variations into the execution time of programs that can be exploited by adversaries to recover private information about users or cryptographic keys. Establishing the security of countermeasures against this threat often requires intricate reasoning about the interactions of program code, memory layout, and hardware architecture and has so far only been done for restricted cases. In this paper we devise novel techniques that provide support for bit-level and arithmetic reasoning about memory accesses in the presence of dynamic memory allocation. These techniques enable us to perform the first Rigorous Analysis of widely deployed software countermeasures against cache attacks on modular exponentiation, based on executable code.

  • Rigorous Analysis of Software Countermeasures against Cache Attacks
    arXiv: Cryptography and Security, 2016
    Co-Authors: Goran Doychev, Boris Köpf
    Abstract:

    CPU caches introduce variations into the execution time of programs that can be exploited by adversaries to recover private information about users or cryptographic keys. Establishing the security of countermeasures against this threat often requires intricate reasoning about the interactions of program code, memory layout, and hardware architecture and has so far only been done for restricted cases. In this paper we devise novel techniques that provide support for bit-level and arithmetic reasoning about memory accesses in the presence of dynamic memory allocation. These techniques enable us to perform the first Rigorous Analysis of widely deployed software countermeasures against cache attacks on modular exponentiation, based on executable code.

Indrakshi Ray - One of the best experts on this subject based on the ideXlab platform.

  • POLICY - Rigorous Analysis of UML Access Control Policy Models
    2011 IEEE International Symposium on Policies for Distributed Systems and Networks, 2011
    Co-Authors: Wuliang Sun, Indrakshi Ray
    Abstract:

    The use of the Unified Modeling Language (UML)for specifying security policies is attractive because it is expressive and has a wide user base in the software industry. However, there are very few mature tools that support Rigorous Analysis of UML models. Alloy is a formal specification language that has been used to Rigorously analyze security policies, but few practitioners have the background needed to develop good Alloy models. We propose a new approach to policy Analysis in which designers use UML at the front-end to describe their security policies and the Alloy Analyzer is used at the backend to analyze the modeled properties. The UML-to-Alloy and Alloy-to-UML transformations obviate the need for security designers to understand the Alloy specification language. The proposed approach supports the Analysis of both functional and structural aspects of security policies.

A. Mohanty - One of the best experts on this subject based on the ideXlab platform.

  • Infinite array of printed dipoles integrated with a printed strip grating for suppression of cross-polar radiation. I. Rigorous Analysis
    IEEE Transactions on Antennas and Propagation, 1997
    Co-Authors: N.k. Das, A. Mohanty
    Abstract:

    A Rigorous Analysis of an infinite array of printed dipoles integrated with a covering layer of printed strip grating is presented. Such designs can be useful to achieve low to ultra-low levels of cross-polar radiation from printed antennas, which is otherwise difficult to obtain from standard printed antenna designs. The Analysis Rigorously accounts for coupling between the grating strips and the dipole array in a general multilayered environment. Various demonstrative and design results showing loading effects of the grating on scan and impedance characteristics of the array are presented. Some interesting fundamental effects of the grating on the cross-polarization level and scan-blindness behavior are discussed.

L. Zappelli - One of the best experts on this subject based on the ideXlab platform.

  • Rigorous Analysis of multiple coupled rib waveguides
    IEEE Transactions on Microwave Theory and Techniques, 1992
    Co-Authors: Tullio Rozzi, Mohd Nor Husain, L. Zappelli
    Abstract:

    The general problem of multiple coupled rib waveguides, where energy may be leaked from one guide to the other via the substrate and radiation mode, is treated. Rigorous results including substrate and air modes coupling are sought for the general case of coupling of two or more different guides. The Analysis, developed in terms of a cascade of the transverse steps, utilizing a variational solution with a single trial function and making explicit use of edge singularities at the dielectric corners in order to produce an effective and Rigorous solution, is presented. Multiple coupled rib guides are then reduced to a cascade of interacting step discontinuities in the transverse direction. When comparison is possible, the numerical results obtained by the method are seen to be as accurate as those obtained by the finite element method (FEM)/finite difference method (FDM), but with a fraction of the computer time and memory involved. >

  • Rigorous Analysis of the GTEM cell
    IEEE Transactions on Microwave Theory and Techniques, 1991
    Co-Authors: Tullio Rozzi, C. Svara, L. Zappelli
    Abstract:

    The modeling of a GTEM cell which consists of a tapered rectangular waveguide loaded with an eccentric sloping plate conductor is discussed. The fields of the cross section of the uniform structure are derived by transverse resonance diffraction. The local modes approach is applied to the study of the longitudinal field distribution. Results show the structure to be actually overmoded rather than quasi-TEM. Numerical results agree with those in the literature, where available. The treatment is highly accurate and requires no more computer power than that of a desktop computer.

Goran Doychev - One of the best experts on this subject based on the ideXlab platform.

  • PLDI - Rigorous Analysis of software countermeasures against cache attacks
    Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2017
    Co-Authors: Goran Doychev, Boris Köpf
    Abstract:

    CPU caches introduce variations into the execution time of programs that can be exploited by adversaries to recover private information about users or cryptographic keys. Establishing the security of countermeasures against this threat often requires intricate reasoning about the interactions of program code, memory layout, and hardware architecture and has so far only been done for restricted cases. In this paper we devise novel techniques that provide support for bit-level and arithmetic reasoning about memory accesses in the presence of dynamic memory allocation. These techniques enable us to perform the first Rigorous Analysis of widely deployed software countermeasures against cache attacks on modular exponentiation, based on executable code.

  • Rigorous Analysis of Software Countermeasures against Cache Attacks
    arXiv: Cryptography and Security, 2016
    Co-Authors: Goran Doychev, Boris Köpf
    Abstract:

    CPU caches introduce variations into the execution time of programs that can be exploited by adversaries to recover private information about users or cryptographic keys. Establishing the security of countermeasures against this threat often requires intricate reasoning about the interactions of program code, memory layout, and hardware architecture and has so far only been done for restricted cases. In this paper we devise novel techniques that provide support for bit-level and arithmetic reasoning about memory accesses in the presence of dynamic memory allocation. These techniques enable us to perform the first Rigorous Analysis of widely deployed software countermeasures against cache attacks on modular exponentiation, based on executable code.