Program
Monday 23rd Sept. |
Tuesday 24th Sept. |
Wednesday 25th Sept. |
Thursday 26th Sept. |
Friday 27th Sept. |
|
---|---|---|---|---|---|
9:00 – 09:30 | 9:00 Thomas Prest Seeing through the matrix: parameter selection in lattice cryptography |
9:00 Nils Jansen Reinforcement Learning Under Attack |
9:00 Wouter Lueks Designing Privacy-Friendly Systems |
9:00 Amir Moradi Tools for generation and evaluation of physical side-channel secure designs |
|
09:30 – 10:00 | |||||
10:00 – 10:30 | |||||
10:30 – 11:00 | 10:30 Welcome Coffee ☕ |
10:30 Coffee break ☕ |
10:30 Coffee break ☕ |
10:30 Coffee break ☕ |
10:30 Coffee break ☕ |
11:00 – 11:30 | 11:00 Eduardo Vela Product Security a-la Google with a hint of opensource |
11:00 Maria Eichlseder Lightweight Cryptography |
11:00 Chelsea Rose Sidrane Neural Network Verification |
11:00 Daniel Gruss Why are there side channels everywhere? |
11:00 Yuval Yarom Microarchitectural Weird Machines |
11:30 – 12:00 | |||||
12:00 – 12:30 | |||||
12:30 – 13:00 | 12:30 Lunch break |
12:30 Lunch break |
12:30 Lunch break |
12:30 Lunch break |
12:30 Goodbye lunch |
13:00 – 13:30 | |||||
13:30 – 14:00 | |||||
14:00 – 14:30 | 14:00 Samuel Ortiz The RISC-V Confidential Computing Architecture |
14:00 Security Week CTF by LosFuzzys Part 1 |
14:00 AI Lab |
14:00 Side-Channel Lab Part 1 |
14:00 Speaker Training (Optional) by Daniel Gruss |
14:30 – 15:00 | |||||
15:00 – 15:30 | |||||
15:30 – 16:00 | 15:30 Coffee break ☕ |
15:30 Coffee break ☕ |
15:30 Social Event 🍫🍷 Visit of the Zotter chocolate factory & Dinner at the traditional styrian Buschenschank Bernhard |
15:30 Coffee break ☕ |
|
16:00 – 16:30 | 16:00 PhD Forum |
16:00 Security Week CTF by LosFuzzys Part 2 |
16:00 Side-Channel Lab Part 2 |
||
16:30 – 17:00 | |||||
17:00 – 17:30 | |||||
17:30 – 18:00 | |||||
18:00 – 18:30 | 18:00 Welcome Dinner️ |
18:00 Dinner️ |
18:00 Dinner️ |
||
18:30 – 19:00 | |||||
19:00 – 19:30 | |||||
19:30 – 20:00 |
A central goal of the school is to enable communication between presenters and the participants. Therefore we will have a so-called PhD forum on Monday.
The basic idea of the forum is that PhD students and researchers present their current research in a 5-minute talk. This will help them to get connected with other participants working on a similar topic. Furthermore, presenting at the PhD forum is a prerequisite for earning optional 2 ECTS.
In this session, you will get hands-on experience with system security, cryptography, web security, and more!
The session will be held as a capture-the-flag competition, where participants must find vulnerabilities in given programs and exploit those vulnerabilities. Upon successful exploitation, you will receive a flag that will reward you with points! This is a great opportunity to network and collaborate with like-minded people to find solutions to security-related problems.
Please bring your own laptop!
In contrast to runtime attacks, the CPU microarchitecture itself gives much more subtle ways to attack an application via side-channels. These side channels range from measuring execution time and detecting memory access patterns, over cache attacks (e.g., Flush+Reload) to Meltdown and Spectre attacks, leaking information across different processes and privilege boundaries. In this lab, you will experiment with various microarchitectural side channels.
In contrast to runtime attacks, the CPU microarchitecture itself gives much more subtle ways to attack an application via side-channels. These side channels range from measuring execution time and detecting memory access patterns, over cache attacks (e.g., Flush+Reload) to Meltdown and Spectre attacks, leaking information across different processes and privilege boundaries. In this lab, you will experiment with various microarchitectural side channels.
We all got to present at conferences sometime during our PhD, but no one taught us how. This Speaker Training is for you.
We will run through a few simple exercises for speaking, intonation, controlling volume, insecurities and confidence, emotions and thoughts during a presentation, and mastering question and answer sessions eloquently.
The space is limited to about 20 people, so please contact daniel.gruss@iaik.tugraz.at if you want to participate.