Program

Monday
23rd Sept.
Tuesday
24th Sept.
Wednesday
25th Sept.
Thursday
26th Sept.
Friday
27th Sept.
9:00 – 09:30 9:00
Thomas Prest

Seeing through the matrix: parameter selection in lattice cryptography
9:00
Nils Jansen

Reinforcement Learning Under Attack
9:00
Wouter Lueks

Designing Privacy-Friendly Systems
9:00
Amir Moradi

Tools for generation and evaluation of physical side-channel secure designs
09:30 – 10:00
10:00 – 10:30
10:30 – 11:00 10:30
Welcome Coffee ☕
10:30
Coffee break ☕
10:30
Coffee break ☕
10:30
Coffee break ☕
10:30
Coffee break ☕
11:00 – 11:30 11:00
Eduardo Vela

Product Security a-la Google with a hint of opensource
11:00
Maria Eichlseder

Lightweight Cryptography
11:00
Chelsea Rose Sidrane


Neural Network Verification
11:00
Daniel Gruss

Why are there side channels everywhere?
11:00
Yuval Yarom

Microarchitectural Weird Machines
11:30 – 12:00
12:00 – 12:30
12:30 – 13:00 12:30
Lunch break
12:30
Lunch break
12:30
Lunch break
12:30
Lunch break
12:30
Goodbye lunch
13:00 – 13:30
13:30 – 14:00
14:00 – 14:30 14:00
Samuel Ortiz

The RISC-V Confidential Computing Architecture
14:00
Security Week CTF
by LosFuzzys

Part 1
14:00
AI Lab

14:00
Side-Channel Lab



Part 1
14:00
Speaker Training
(Optional)


by Daniel Gruss
14:30 – 15:00
15:00 – 15:30
15:30 – 16:00 15:30
Coffee break ☕
15:30
Coffee break ☕
15:30
Social Event 🍫🍷


Visit of the Zotter chocolate factory
&
Dinner at the
traditional styrian Buschenschank Bernhard
15:30
Coffee break ☕
16:00 – 16:30 16:00
PhD Forum
16:00
Security Week CTF
by LosFuzzys

Part 2
16:00
Side-Channel Lab



Part 2
16:30 – 17:00
17:00 – 17:30
17:30 – 18:00
18:00 – 18:30 18:00
Welcome Dinner️
18:00
Dinner️
18:00
Dinner️
18:30 – 19:00
19:00 – 19:30
19:30 – 20:00
PhD Forum

A central goal of the school is to enable communication between presenters and the participants. Therefore we will have a so-called PhD forum on Monday.
The basic idea of the forum is that PhD students and researchers present their current research in a 5-minute talk. This will help them to get connected with other participants working on a similar topic. Furthermore, presenting at the PhD forum is a prerequisite for earning optional 2 ECTS.

Security Week CTF by LosFuzzys

In this session, you will get hands-on experience with system security, cryptography, web security, and more!
The session will be held as a capture-the-flag competition, where participants must find vulnerabilities in given programs and exploit those vulnerabilities. Upon successful exploitation, you will receive a flag that will reward you with points! This is a great opportunity to network and collaborate with like-minded people to find solutions to security-related problems.

Please bring your own laptop!

AI Lab

In contrast to runtime attacks, the CPU microarchitecture itself gives much more subtle ways to attack an application via side-channels. These side channels range from measuring execution time and detecting memory access patterns, over cache attacks (e.g., Flush+Reload) to Meltdown and Spectre attacks, leaking information across different processes and privilege boundaries. In this lab, you will experiment with various microarchitectural side channels.

Side-Channels Lab

In contrast to runtime attacks, the CPU microarchitecture itself gives much more subtle ways to attack an application via side-channels. These side channels range from measuring execution time and detecting memory access patterns, over cache attacks (e.g., Flush+Reload) to Meltdown and Spectre attacks, leaking information across different processes and privilege boundaries. In this lab, you will experiment with various microarchitectural side channels.

Speaker Training (optional)

We all got to present at conferences sometime during our PhD, but no one taught us how. This Speaker Training is for you.
We will run through a few simple exercises for speaking, intonation, controlling volume, insecurities and confidence, emotions and thoughts during a presentation, and mastering question and answer sessions eloquently.

The space is limited to about 20 people, so please contact daniel.gruss@iaik.tugraz.at if you want to participate.