High-Assurance Cryptography in the Spectre Era
Offered By: IEEE via YouTube
Course Description
Overview
Explore the critical intersection of cryptography and cybersecurity in the age of Spectre vulnerabilities through this 15-minute IEEE presentation. Delve into the challenges posed by speculative execution attacks, understand the concept of constant-time programming, and learn about innovative approaches to high-assurance cryptography. Discover verification techniques, performance considerations, and developer tools designed to enhance cryptographic implementations' resilience against side-channel attacks. Gain valuable insights into securing modern cryptographic systems in an era of evolving hardware vulnerabilities.
Syllabus
Introduction
The Big Four
The Problem
The Approach
What is Constant Time
Speculative Execution Semantics
Verification
Extensions
Performance
Developer Verification
Conclusion
Taught by
IEEE Symposium on Security and Privacy
Tags
Related Courses
Ret2spec- Speculative Execution Using Return Stack BuffersAssociation for Computing Machinery (ACM) via YouTube Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction
Black Hat via YouTube Mill vs. Spectre - Performance and Security
Strange Loop Conference via YouTube Spectre Attacks Exploiting Speculative Execution
IEEE via YouTube Mitigating Spectre Attacks Using CFI Informed Speculation
IEEE via YouTube