YoVDO

High-Assurance Cryptography in the Spectre Era

Offered By: IEEE via YouTube

Tags

Cryptography Courses Cybersecurity Courses Speculative Execution Courses

Course Description

Overview

Explore the critical intersection of cryptography and cybersecurity in the age of Spectre vulnerabilities through this 15-minute IEEE presentation. Delve into the challenges posed by speculative execution attacks, understand the concept of constant-time programming, and learn about innovative approaches to high-assurance cryptography. Discover verification techniques, performance considerations, and developer tools designed to enhance cryptographic implementations' resilience against side-channel attacks. Gain valuable insights into securing modern cryptographic systems in an era of evolving hardware vulnerabilities.

Syllabus

Introduction
The Big Four
The Problem
The Approach
What is Constant Time
Speculative Execution Semantics
Verification
Extensions
Performance
Developer Verification
Conclusion


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Ret2spec- Speculative Execution Using Return Stack Buffers
Association for Computing Machinery (ACM) via YouTube
Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction
Black Hat via YouTube
Mill vs. Spectre - Performance and Security
Strange Loop Conference via YouTube
Spectre Attacks Exploiting Speculative Execution
IEEE via YouTube
Mitigating Spectre Attacks Using CFI Informed Speculation
IEEE via YouTube