NEXT TALKS

MAY 2022
 

Side Channel Analysis: Instruction extraction and Information estimation by Valence CRISTIANI (CEA-LETI, Université de Montpellier, LIRMM)

Date : 6 may 2022
10:00 to 11:00
Place : Room Pétri/Turing

Side-channel usually aims at extracting cryptographic secrets from electronic devices through their physical leakages. However, these channels can leak other sensitive information. The first part of this talk will present a study of side channel-based disassembling (SCBD) that aims to recover instructions executed by a microcontroller. The main threat represented by SCBD is that it potentially allows to find a vulnerability in the executed code or to extract protected software IP. In the second part, we take a step back and aboard the generic topics of the amount of information leaked by a system. Indeed, whatever the target variable (secret key, instructions.) and the utilized strategy, the amount of information one could gain from a side-channel trace is always bounded by the Mutual Information (MI) between the secret and the trace. This makes it, all punning aside, a key quantity for leakage evaluation. Unfortunately, traces are usually of too high dimension for existing statistical estimators to stay sound when computing the MI over full traces. However, recent works from the machine learning community have shown that it is possible to evaluate the MI in high dimensional space thanks to newest deep learning techniques. We will explore how this new estimator could impact the side-channel domain both for leakage assessment and for unsupervised mutual information-based attacks.

 

Security challenges and opportunities in emerging device technologies: a case study on flexible electronics” by Nele MENTENS (Leiden University, The Netherlands​, and KU Leuven, Belgium)

Date : 6 may 2022
11:00 to 12:00
Place : Room Pétri/Turing

While traditional chips in bulk silicon technology are widely used for reliableand highly efficient systems, there are applications that call for devices in othertechnologies. On the one hand, novel device technologies need to be re-evaluatedwith respect to potential threats and attacks, and how these can be faced withexisting and novel security solutions and methods. On the other hand, emergingdevice technologies bring opportunities for building the secure systems of thefuture. This talk gives an overview of the minimal hardware resources that areneeded to build secure systems and discusses a case study on flexible electronicson plastics.

 

JUNE 2022
 

“Ghosting the Spectre: fine-grained control over speculative execution” by Alison RENDAL (University of Cambridge and Rivos Inc)

Date : 6 may 2022
10:00 to 11:00
Place : Room Aurigny

A series of vulnerabilities related to speculative execution rose to attention in 2018. The techniques behind these vulnerabilities were not new, but the combined application of the techniques was more sophisticated, and the security impact more severe, than previously considered possible. Current mitigations for the speculative execution vulnerabilities only offer partial protection, have prohibitive performance penalties, and apply globally so mitigations must be chosen during hardware manufacture or data center deployment. Infrastructure, operating system, and application developers have little or no control over which mitigations are deployed, and therefore no choice in whether they endure the risk of speculation or suffer the performance penalty of mitigations. This talk considers three approaches that partially or completely eliminate speculative execution from modern hardware architectures, as a finer-grained approach to mitigating the speculative execution vulnerabilities.

 

Comments are closed.