• 0 Posts
  • 73 Comments
Joined 1 year ago
cake
Cake day: June 19th, 2023

help-circle

  • As the first AI-based mutation testing tool, Mutahunter surpasses traditional “dumb” AST-based methods. Our AI-driven approach provides a full contextual understanding of the entire codebase,

    This is where I call bullshit. The AST is a precise representation of the code which should be easier to analyse and modify instead of the raw text. If you only rely on processing the text I have a hard time believing your AI has a deep understanding of the contextual interdependencies of the different parts of the code.

    Edit: it kinda does use the AST if one of the preconditions is a treesitter grammar? Maybe the marketing wording is just very unfortunate?


















  • So the attack is (very basically, if I understand correctly)

    Setup:

    • I control at least one process on the machine I am targeting another process on
    • I can send data to the target process and the process will decrypt that

    Attack:

    • I send data that in some intermediate state of decryption will look like a pointer
    • This “pointer” contains some information about the secret key I am trying to steal
    • The prefetcher does it’s thing loading the data “pointed to” in the cache
    • I can observe via a cache side channel what the prefetcher did, giving me this “pointer” containing information about the secret key
    • Repeat until I have gathered enough information about the secret key

    Is this somewhat correct? Those speculative execution vulnerabilities always make my brain hurt a little