YoVDO

Leakage Models: A Leaky Abstraction in Cryptographic Software Verification

Offered By: ACM SIGPLAN via YouTube

Tags

Cryptography Courses Side Channel Attacks Courses Formal Verification Courses Timing Attacks Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a groundbreaking proposal to revolutionize the verification of timing properties in cryptographic software during this 12-minute conference talk from ACM SIGPLAN. Delve into the innovative approach presented by researchers from MIT and NYU, who suggest abandoning traditional leakage models in favor of direct verification against hardware implementations at the gate level. Discover the results of their early experiments, which successfully verified constant-time execution of Ed25519 signature computations on a 7-stage pipelined processor. Gain insights into the significant open challenges that lie ahead, including scaling up the tool for modern out-of-order speculative cores and extending the methodology to analyze library code beyond whole application contexts.

Syllabus

[PLARCH23] Leakage models are a leaky abstraction (...)


Taught by

ACM SIGPLAN

Related Courses

SPARK 2014
AdaCore via Independent
Automated Reasoning: Symbolic Model Checking
EIT Digital via Coursera
Software Testing and Verification
University System of Maryland via edX
Haskell for Imperative Programmers
YouTube
Model Checking and Temporal Logic - E. Allen Emerson's Turing Award Lecture
Association for Computing Machinery (ACM) via YouTube