[kwlug-disc] UofW CACR talk: Daniel Genkin - System securty: from theory to practice under tampering and leakage

Bob Jonkman bjonkman at sobac.com
Thu Jan 18 14:46:38 EST 2018


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

After our round table discussion last week on Spectre and Meltdown,
some people may be interested in this talk from the UofW Centre for
Applied Cryptographic Research.

- --Bob.


- -------- Forwarded Message --------
From: Florian Kerschbaum <florian.kerschbaum at uwaterloo.ca>
Date: Thu, 18 Jan 2018 10:42:25 -0500
To: cacr-grads at mailman.uwaterloo.ca
Subject: [cacr-grads] Talk: Daniel Genkin Jan 23 10:30am

Hello everyone,

please join us for a security talk by CS faculty candidate Daniel Genkin
including the recent Intel bugs Spectre and Meltdown.

Cheers,
Florian


Date/Time/Room: Tuesday, January 23, 2018 – 10:30am – DC 1304

Speaker: Daniel Genkin

TITLE: System security: from theory to practice under tampering and
leakage

ABSTRACT:  The security of any system is only as good as its weakest link.
Even if the system's security is theoretically proven, when faced with
real-word adversaries many assumptions commonly made by system designers
often become flaky, inaccurate or even completely incorrect.
In this talk, I will present three cases for bridging this gap between
security theory and security practice:
- -  Spectre and Meltdown: exploiting microarchitectural leakage from modem
CPUs in order to read protected kernel data and lessons learned for future
CPU designs
- -  Utilizing unintentional physical side-channel leakage from complex
computing devices in order to extract secret cryptographic keys and the
relation of these attacks to leakage resilient cryptography.
- -  Constructing and deploying verifiable computation protocols for
arbitrary C programs.

The talk will discuss cryptographic techniques and will include live
demonstrations.

BIO:  I am currently a Postdoctoral Fellow in the University of
Pennsylvania and the University of Maryland where I am hosted by Prof.
Nadia Heninger and Prof. Jonathan Katz. I am a member of Penn's Security
Laboratory, Distributed Systems Laboratory and UMD's Cybersecurity Center
(MC2).  Previously I have been a Ph.D student at the Computer Science
Department in the Technion — Israel's Institute of Technology where I was
co-advised by Prof. Yuval Ishai and Prof. Eran Tromer.
My research interest are in cryptography and in system security. I am
interested in both theory and practice with particular interests in
side-channel attacks, hardware security, cryptanalysis, secure multiparty
computation (MPC), verifiable computation and SNARKS.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
Comment: Ensure confidentiality, authenticity, non-repudiability

iEYEARECAAYFAlpg+ZcACgkQuRKJsNLM5erMkQCfXeN/4+wXLCT15UK/g+vK62fq
rSsAoJYdhOdTQmoh75RtgyKrfT3z3bQN
=q5R4
-----END PGP SIGNATURE-----




More information about the kwlug-disc mailing list