Co-Design and Co-Verification of Masked Software Implementations on CPUs
Offered By: TheIACR via YouTube
Course Description
Overview
Explore a comprehensive talk on co-design and co-verification of masked software implementations on CPUs. Delve into physical side-channel attacks, the hardware/software gap, and the co-verification flow of Coco. Examine software constraints for register files, evaluate solutions to various problems, and gain insights into future developments in this field. Learn from Barbara Gigerl's expertise as she presents at TASER 2021, offering valuable knowledge for those interested in secure software implementation and CPU architecture.
Syllabus
Intro
Physical Side-Channel Attacks
The HW/SW Gap
Example: Register file
Co-Verification Flow of Coco
Co-Verification with Coco
Co-Design with Coco
Example: SW Constraints for Register File
Further Problems and Solutions
Evaluation
Outlook
Summary
Taught by
TheIACR
Related Courses
Getting Started with Reverse EngineeringPluralsight Intro to Binary Exploitation
HTB Academy via Independent Energy Efficient Programming
openHPI Journey to the Centre of the JVM - Exploring CPU Architecture and Memory Models
ChariotSolutions via YouTube One Glitch to Rule Them All - Fault Injection Attacks Against the AMD Secure Processor
Black Hat via YouTube