624 results
-
I know what your compiler did: Optimization Effects on Power Side-Channel Leakage for RISC-V
Speaker : Ileana Buhan - Radboud University Nijmegen
With the growing prevalence of software-based cryptographic implementations in high-level languages, understanding the role of architectural and micro-architectural components in side-channel security is critical. The role of compilers in case of software implementations towards contribution to side-channel leaks is not investigated. While timing-based side-channel leakage due to compiler effects[…]-
SemSecuElec
-
Side-channel
-
-
Hardware Trojan Horses and Microarchitectural Side-Channel Attacks: Detection and Mitigation via Hardware-based Methodologies
Speaker : Alessandro PALUMBO - CentraleSupélec, IRISA, Inria
Hardware Trojan Horses that are software-exploitable can be inserted into microprocessors, allowing attackers to run unauthorized code or escalate privileges. Additionally, it has been demonstrated that attackers could observe certain microprocessor features - seemingly unrelated to the program's execution - to exfiltrate secrets or private data. So, even devices produced in secure foundries could[…]-
SemSecuElec
-
Side-channel
-
Micro-architectural vulnerabilities
-
Hardware trojan
-
-
Séminaire C2
11h30 Katharina Boudgoust (CR CNRS, LIRMM) : The Power of NAPs: Compressing OR-Proofs via Collision-Resistant HashingProofs of partial knowledge allow for proving the validity of t out of n different statements without revealing which ones those are. In this presentation, we describe a new approach for transforming certain proofs system into new ones that allows for proving partial knowledge. The[…] -
A Universal Composability analysis of Android Protected Confirmation
Speaker : Maïwenn Racouchot - CISPA
As phones are used for more and more sensitive operations (such as bank transfers for example), there is a great necessity to design and deploy protocols that can ensure the security of such transactions, even in cases when the phone has been compromised. In order to accomplish that, Android in collaboration with Google have worked on a protocol called Android Protected Confirmation. The idea[…]-
SoSysec
-
Formal methods
-
Protocols
-
-
Post-quantum Group-based Cryptography
Speaker : Delaram Kahrobaei - The City University of New York
Group-based cryptography is a relatively new family in post-quantum cryptography, with high potential. I will give a general survey of the status of post-quantum group-based cryptography and present some recent results.In the second part of my talk, I speak about Post-quantum hash functions using special linear groups. This hash function is a generalization of Tillich-Zemor hash function as well[…] -
Approches humanitaires du risque numérique : accidents de sécurité et impératif de protection
Speaker : Laetitia Della Torre - Université de technologie de Compiègne
Les ONG clament qu’elles ne sont pas des cibles (« not a target »), et plaident pour un arrêt des enlèvements d’humanitaires et des bombardements d’hôpitaux. Ajoutons que ce slogan est maintenant décliné dans une version « modernisée » : les ONG ne sont pas des cibles numériques (« not a digital target »). Ce slogan constitue un appel à stopper les cyberopérations contre les ONG, qui sont[…]-
Risk management
-
SoSysec
-