YoVDO

Leakage Models: A Leaky Abstraction in Cryptographic Software Verification

Offered By: ACM SIGPLAN via YouTube

Tags

Cryptography Courses Side Channel Attacks Courses Formal Verification Courses Timing Attacks Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a groundbreaking proposal to revolutionize the verification of timing properties in cryptographic software during this 12-minute conference talk from ACM SIGPLAN. Delve into the innovative approach presented by researchers from MIT and NYU, who suggest abandoning traditional leakage models in favor of direct verification against hardware implementations at the gate level. Discover the results of their early experiments, which successfully verified constant-time execution of Ed25519 signature computations on a 7-stage pipelined processor. Gain insights into the significant open challenges that lie ahead, including scaling up the tool for modern out-of-order speculative cores and extending the methodology to analyze library code beyond whole application contexts.

Syllabus

[PLARCH23] Leakage models are a leaky abstraction (...)


Taught by

ACM SIGPLAN

Related Courses

Hardware Security
University of Maryland, College Park via Coursera
Cryptography and Information Theory
University of Colorado System via Coursera
Introduction to Software Side Channels and Mitigations
Graz University of Technology via edX
Side-Channel Security: Developing a Side-Channel Mindset
Graz University of Technology via edX
Physical and Advanced Side-Channel Attacks
Graz University of Technology via edX