Program

timetable coming soon

Confirmed Speakers

Sahar Abdelnabi, Microsoft
Jo Van Bulck, KU Leuven
Maria Eichlseder, TU Graz
Daniel Gruss, TU Graz
David Oswald, University of Birmingham
Fabio Pierazzi, University College London
Kaveh Razavi, ETH Zürich
Christian Rossow, CISPA
Yang Zhang, CISPA

Preliminary Timetable
Monday
Sept. 1st
Tuesday
Sept. 2nd
Wednesday
Sept. 3rd
Thursday
Sept. 4th
Friday
Sept. 5th
9:00 – 09:30 9:00
Fabio Pierazzi

9:00
Yang Zhang

Safety Assessment of Large Generative Models

9:00
Sahar Abdelnabi

9:00
Maria Eichlseder

09:30 – 10:00
10:00 – 10:30
10:30 – 11:00 10:30
Welcome Coffee ☕
10:30
Coffee break ☕
10:30
Coffee break ☕
10:30
Coffee break ☕
10:30
Coffee break ☕
11:00 – 11:30 11:00
David Oswald

11:00
Christian Rossow

11:00
Daniel Gruss
& Stefan Mangard

11:00
Jo Van Bulck

Trust Under Siege: Exploiting and Mitigating Interface-Based Attacks on TEEs

11:00
Speaker TBA

11:30 – 12:00
12:00 – 12:30
12:30 – 13:00 12:30
Lunch break
12:30
Lunch break
12:30
Lunch break
12:30
Lunch break
12:30
Goodbye lunch
13:00 – 13:30
13:30 – 14:00
14:00 – 14:30 14:00
Kaveh Razavi

Advanced Branch Target Injection Attacks

14:00
Security Week CTF
by LosFuzzys

Part 1
14:00
Hardware
Side-Channel Lab
14:00
Software
Side-Channel Lab


Part 1

14:00
Speaker Training


hosted by
Daniel Gruss
14:30 – 15:00
15:00 – 15:30
15:30 – 16:00 15:30
Coffee break ☕
15:30
Coffee break ☕
15:30
Social Event 🍫🍷


Visit of the Zotter chocolate factory (sponsored by ISEC)
&
Dinner with scientific keynote speech at a
traditional styrian Buschenschank
15:30
Coffee break ☕
16:00 – 16:30 16:00
PhD Forum


16:00
Security Week CTF
by LosFuzzys

Part 2
16:00
Software
Side-Channel Lab


Part 2
16:30 – 17:00
17:00 – 17:30
17:30 – 18:00
18:00 – 18:30 18:00
Welcome Dinner️
18:00
Dinner️
18:00
Dinner️
18:30 – 19:00
19:00 – 19:30
19:30 – 20:00
The First Day

We will meet on Monday, Sept 1st, at Rechbauerstraße 12, 8010 Graz, on the first floor in front of the auditorium (“Aula”) where the summer school takes place.

Starting from 10:30 am, we will be there to welcome you with coffee and cake, and to hand you our welcome package.
The school starts at 11:00 am in the “Aula”.

For infos & if you have questions:
Ask our staff on site or join our Discord server

PhD Forum

A central goal of the school is to enable communication between presenters and the participants. Therefore we will have a so-called PhD forum on Monday. Everyone is welcome to join and listen to the presentations!

The basic idea of the forum is that PhD students and researchers joining GSW present their current research in a 5-minute talk. This will help them to get connected with other participants working on a similar topic. Furthermore, presenting at the PhD forum is a prerequisite for earning optional 2 ECTS.

Please email your slides until Sunday, 24 August at the latest to securityweek.isec@tugraz.at!

Security Week CTF by LosFuzzys

In this session, you will get hands-on experience with system security, cryptography, web security, and more!
The session is hosted by the student team LosFuzzys as a beginner-friendly capture-the-flag competition, where participants must find and exploit vulnerabilities in given programs. Upon successful exploitation, you will receive a flag that will reward you with points! This is a great opportunity to network and collaborate with like-minded people to find solutions to security-related problems.

Please bring your own laptop!

Hardware Side-Channel Lab

In this tutorial, you will use physical side-channel attacks to break the security of embedded devices.
We will use power analysis attacks and measure the power consumption of a microcontroller while it performs encryptions. Using the power consumption of the device, we will extract the used encryption key.
In particular, we will investigate how to conduct these attacks on simulated secure systems and the AES block cipher. All the experiments will be performed on a real microcontroller on a ChipWhisperer board, which lets you easily measure the power consumption and inject faults.

Software Side-Channels Lab

In contrast to runtime attacks, the CPU microarchitecture itself gives much more subtle ways to attack an application via side-channels. These side channels range from measuring execution time and detecting memory access patterns, over cache attacks (e.g., Flush+Reload) to Meltdown and Spectre attacks, leaking information across different processes and privilege boundaries. In this lab, you will experiment with various microarchitectural side channels.

Speaker Training

We all got to present at conferences sometime during our PhD, but no one taught us how. This Speaker Training is for you!
We will run through a few simple exercises for speaking, intonation, controlling volume, insecurities and confidence, emotions and thoughts during a presentation, and mastering question and answer sessions eloquently.