YoVDO

Co-Design and Co-Verification of Masked Software Implementations on CPUs

Offered By: TheIACR via YouTube

Tags

CPU Architecture Courses Cryptography Courses Software Security Courses Side Channel Attacks Courses Co-Design Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive talk on co-design and co-verification of masked software implementations on CPUs. Delve into physical side-channel attacks, the hardware/software gap, and the co-verification flow of Coco. Examine software constraints for register files, evaluate solutions to various problems, and gain insights into future developments in this field. Learn from Barbara Gigerl's expertise as she presents at TASER 2021, offering valuable knowledge for those interested in secure software implementation and CPU architecture.

Syllabus

Intro
Physical Side-Channel Attacks
The HW/SW Gap
Example: Register file
Co-Verification Flow of Coco
Co-Verification with Coco
Co-Design with Coco
Example: SW Constraints for Register File
Further Problems and Solutions
Evaluation
Outlook
Summary


Taught by

TheIACR

Related Courses

Physical and Advanced Side-Channel Attacks
Graz University of Technology via edX
Side-Channel Security: Developing a Side-Channel Mindset
Graz University of Technology via edX
Introduction to Software Side Channels and Mitigations
Graz University of Technology via edX
Cryptography and Information Theory
University of Colorado System via Coursera
Hardware Security
University of Maryland, College Park via Coursera