Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleSeptember 2024
Collision Attacks on Hashing Modes of Areion
AbstractAreion is a family of wide-block permutations proposed at CHES 2023. For the security against differential attacks of Areion, the designers showed only upper bounds of the differential characteristic probability, which are derived from the lower ...
Pragmatic Random Sampling of the Linux Kernel: Enhancing the Randomness and Correctness of the conf Tool
- David Fernandez-Amoros,
- Ruben Heradio,
- Jose Miguel Horcas Aguilera,
- José A. Galindo,
- David Benavides,
- Lidia Fuentes
SPLC '24: Proceedings of the 28th ACM International Systems and Software Product Line ConferencePages 24–35https://doi.org/10.1145/3646548.3672586The configuration space of some systems is so large that it cannot be computed. This is the case with the Linux Kernel, which provides almost 19,000 configurable options described across more than 1,600 files in the Kconfig language. As a result, many ...
- ArticleSeptember 2024
Recent Developments in Real Quantifier Elimination and Cylindrical Algebraic Decomposition (Extended Abstract of Invited Talk)
AbstractThis extended abstract accompanies an invited talk at CASC 2024, which surveys recent developments in Real Quantifier Elimination (QE) and Cylindrical Algebraic Decomposition (CAD). After introducing these concepts we will first consider ...
- research-articleJuly 2024
SAT and Lattice Reduction for Integer Factorization
ISSAC '24: Proceedings of the 2024 International Symposium on Symbolic and Algebraic ComputationPages 391–399https://doi.org/10.1145/3666000.3669712The difficulty of factoring large integers into primes is the basis for cryptosystems such as RSA. Due to the widespread popularity of RSA, there have been many proposed attacks on the factorization problem such as side-channel attacks where some bits ...
-
- ArticleJuly 2024
Booleguru, the Propositional Polyglot (Short Paper)
AbstractRecent approaches on verification and reasoning solve SAT and QBF encodings using state-of-the-art SMT solvers, as it “makes implementation much easier”. The ease-of-use of these solvers make SAT and QBF solvers less visible to users of solvers—...
SuperStack: Superoptimization of Stack-Bytecode via Greedy, Constraint-Based, and SAT Techniques
- Elvira Albert,
- Maria Garcia de la Banda,
- Alejandro Hernández-Cerezo,
- Alexey Ignatiev,
- Albert Rubio,
- Peter J. Stuckey
Proceedings of the ACM on Programming Languages (PACMPL), Volume 8, Issue PLDIArticle No.: 205, Pages 1437–1462https://doi.org/10.1145/3656435Given a loop-free sequence of instructions, superoptimization techniques use a constraint solver to search for an equivalent sequence that is optimal for a desired objective. The complexity of the search grows exponentially with the length of the ...
- short-paperJune 2024
Accelerating Boolean Constraint Propagation for Efficient SAT-Solving on FPGAs
GLSVLSI '24: Proceedings of the Great Lakes Symposium on VLSI 2024Pages 305–309https://doi.org/10.1145/3649476.3658808We present a hardware-accelerated SAT solver targeting processor/Field Programmable Gate Arrays (FPGA) SoCs. Our solution accelerates the most expensive subroutine of the Davis-Putnam-Logemann-Loveland (DPLL) algorithm, Boolean Constraint Propagation (...
- research-articleAugust 2024
Linear cryptanalysis of SPECK and SPARX
Journal of Information Security and Applications (JISA), Volume 83, Issue Chttps://doi.org/10.1016/j.jisa.2024.103773AbstractSPECK and SPARX are two kinds of block ciphers with an ARX structure. In this paper, we use the SAT-based automatic search tool to search for linear approximations of these two ARX ciphers. As a result, we find a linear approximation for 17-round ...
- research-articleJune 2024
SAT backdoors: Depth beats size
Journal of Computer and System Sciences (JCSS), Volume 142, Issue Chttps://doi.org/10.1016/j.jcss.2024.103520AbstractFor several decades, much effort has been put into identifying classes of CNF formulas whose satisfiability can be decided in polynomial time. Classic results are the linear-time tractability of Horn formulas (Aspvall, Plass, and Tarjan, 1979) ...
- ArticleOctober 2024
Augmenting Interpolation-Based Model Checking with Auxiliary Invariants
AbstractSoftware model checking is a challenging problem, and generating relevant invariants is a key factor in proving the safety properties of a program. Program invariants can be obtained by various approaches, including lightweight procedures based on ...
- ArticleApril 2024
Btor2-Cert: A Certifying Hardware-Verification Framework Using Software Analyzers
Tools and Algorithms for the Construction and Analysis of SystemsPages 129–149https://doi.org/10.1007/978-3-031-57256-2_7AbstractFormal verification is essential but challenging: Even the best verifiers may produce wrong verification verdicts. Certifying verifiers enhance the confidence in verification results by generating a witness for other tools to validate the verdict ...
- research-articleMarch 2024
- ArticleFebruary 2024
- research-articleDecember 2023
Computing optimal hypertree decompositions with SAT
AbstractHypertree width is a prominent hypergraph invariant with many algorithmic applications in constraint satisfaction and databases. We propose two novel characterisations for hypertree width in terms of linear orderings. We utilize these ...
- research-articleNovember 2023
On Solving MAX-SAT Using Sum of Squares
INFORMS Journal on Computing (INFORMS-IJOC), Volume 36, Issue 2Pages 417–433https://doi.org/10.1287/ijoc.2023.0036We consider semidefinite programming (SDP) approaches for solving the maximum satisfiability (MAX-SAT) problem and weighted partial MAX-SAT. It is widely known that SDP is well-suited to approximate (MAX-)2-SAT. Our work shows the potential of SDP also ...
- research-articleNovember 2023
On the benefits of knowledge compilation for feature-model analyses
Annals of Mathematics and Artificial Intelligence (KLU-AMAI), Volume 92, Issue 5Pages 1013–1050https://doi.org/10.1007/s10472-023-09906-6AbstractFeature models are commonly used to specify the valid configurations of product lines. As industrial feature models are typically complex, researchers and practitioners employ various automated analyses to study the configuration spaces. Many of ...
- ArticleOctober 2023
Differential Cryptanalysis with SAT, SMT, MILP, and CP: A Detailed Comparison for Bit-Oriented Primitives
- Emanuele Bellini,
- Alessandro De Piccoli,
- Mattia Formenti,
- David Gerault,
- Paul Huynh,
- Simone Pelizzola,
- Sergio Polese,
- Andrea Visconti
AbstractSAT, SMT, MILP, and CP, have become prominent in the differential cryptanalysis of cryptographic primitives. In this paper, we review the techniques for constructing differential characteristic search models in these four formalisms. Additionally, ...
- research-articleFebruary 2024
On Optimal QUBO Encoding of Boolean Logic, (Max-)3-SAT and (Max-)k-SAT with Integer Programming
ICACS '23: Proceedings of the 7th International Conference on Algorithms, Computing and SystemsPages 145–153https://doi.org/10.1145/3631908.3631929We present an asymptotic improvement in the number of variables (n + m⌊log 2(k − 1)⌋) required for state-of-the-art formulation of (max-)k-SAT problems when encoded as a quadratic unconstrained binary optimization (QUBO) problem. We further show a ...
- research-articleOctober 2023
Are hitting formulas hard for resolution?
Discrete Applied Mathematics (DAMA), Volume 337, Issue CPages 173–184https://doi.org/10.1016/j.dam.2023.05.003AbstractHitting formulas, introduced by Iwama, are an unusual class of propositional CNF formulas. Not only is their satisfiability decidable in polynomial time, but even their models can be counted in closed form. This stands in stark ...