Threshold Implementations in Software: Micro-architectural Leakages in Algorithms - Best Paper CHES 2023
Offered By: TheIACR via YouTube
Course Description
Overview
Watch the award-winning presentation from CHES 2023 on "Threshold Implementations in Software: Micro-architectural Leakages in Algorithms" by John Gaspoz and Siemen Dhooghe. Explore key concepts like SED attacks, masking, transition leakage, glitch leakage, and bitwise interaction leakage. Gain insights into implementation details, metrics, and the significance of this research in cryptographic hardware and embedded systems security. Engage with the Q&A session to deepen your understanding of this cutting-edge work in micro-architectural leakages.
Syllabus
Introduction
What areSED attacks
Masking
Motivation
Transition Leakage
Glitch Leakage
Bitwise Interaction leakage
Kack
Sbox
Implementation Details
Spoiler Alert
Metrics
Summary
Questions
Taught by
TheIACR
Related Courses
CompTIA Security+ (SY0-601) Cert Prep: 7 Endpoint Security Design and ImplementationLinkedIn Learning SSCP Cert Prep: 7 Systems and Application Security
LinkedIn Learning The Internet of Insecure Things - 10 Most Wanted List
YouTube ICEFALL - Revisiting A Decade Of OT Insecure-By-Design Practices
Hack In The Box Security Conference via YouTube Low Level BootROM Protocol Fuzzing Secure Memory Regions
Hack In The Box Security Conference via YouTube