[kwlug-disc] UofW CACR talk: Daniel Genkin - System securty: from theory to practice under tampering and leakage
Bob Jonkman
bjonkman at sobac.com
Thu Jan 18 14:46:38 EST 2018
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
After our round table discussion last week on Spectre and Meltdown,
some people may be interested in this talk from the UofW Centre for
Applied Cryptographic Research.
- --Bob.
- -------- Forwarded Message --------
From: Florian Kerschbaum <florian.kerschbaum at uwaterloo.ca>
Date: Thu, 18 Jan 2018 10:42:25 -0500
To: cacr-grads at mailman.uwaterloo.ca
Subject: [cacr-grads] Talk: Daniel Genkin Jan 23 10:30am
Hello everyone,
please join us for a security talk by CS faculty candidate Daniel Genkin
including the recent Intel bugs Spectre and Meltdown.
Cheers,
Florian
Date/Time/Room: Tuesday, January 23, 2018 – 10:30am – DC 1304
Speaker: Daniel Genkin
TITLE: System security: from theory to practice under tampering and
leakage
ABSTRACT: The security of any system is only as good as its weakest link.
Even if the system's security is theoretically proven, when faced with
real-word adversaries many assumptions commonly made by system designers
often become flaky, inaccurate or even completely incorrect.
In this talk, I will present three cases for bridging this gap between
security theory and security practice:
- - Spectre and Meltdown: exploiting microarchitectural leakage from modem
CPUs in order to read protected kernel data and lessons learned for future
CPU designs
- - Utilizing unintentional physical side-channel leakage from complex
computing devices in order to extract secret cryptographic keys and the
relation of these attacks to leakage resilient cryptography.
- - Constructing and deploying verifiable computation protocols for
arbitrary C programs.
The talk will discuss cryptographic techniques and will include live
demonstrations.
BIO: I am currently a Postdoctoral Fellow in the University of
Pennsylvania and the University of Maryland where I am hosted by Prof.
Nadia Heninger and Prof. Jonathan Katz. I am a member of Penn's Security
Laboratory, Distributed Systems Laboratory and UMD's Cybersecurity Center
(MC2). Previously I have been a Ph.D student at the Computer Science
Department in the Technion — Israel's Institute of Technology where I was
co-advised by Prof. Yuval Ishai and Prof. Eran Tromer.
My research interest are in cryptography and in system security. I am
interested in both theory and practice with particular interests in
side-channel attacks, hardware security, cryptanalysis, secure multiparty
computation (MPC), verifiable computation and SNARKS.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
Comment: Ensure confidentiality, authenticity, non-repudiability
iEYEARECAAYFAlpg+ZcACgkQuRKJsNLM5erMkQCfXeN/4+wXLCT15UK/g+vK62fq
rSsAoJYdhOdTQmoh75RtgyKrfT3z3bQN
=q5R4
-----END PGP SIGNATURE-----
More information about the kwlug-disc
mailing list