Program
Monday 23rd Sept. |
Tuesday 24th Sept. |
Wednesday 25th Sept. |
Thursday 26th Sept. |
Friday 27th Sept. |
|
---|---|---|---|---|---|
9:00 – 09:30 | 9:00 Thomas Prest Post-Quantum Secure Messaging @ Lecture room HS i7 |
9:00 Bettina Könighofer Combining Model-Based and Model-Free AI @ Lecture room HS i7 |
9:00 Wouter Lueks Designing Privacy-Friendly Systems @ Lecture room HS i1 |
9:00 Amir Moradi Tools for generation and evaluation of physical side-channel secure designs @ Lecture room HS i1 |
|
09:30 – 10:00 | |||||
10:00 – 10:30 | |||||
10:30 – 11:00 | 10:30 Welcome Coffee ☕ |
10:30 Coffee break ☕ |
10:30 Coffee break ☕ |
10:30 Coffee break ☕ |
10:30 Coffee break ☕ |
11:00 – 11:30 | 11:00 Eduardo Vela Product Security a-la Google with a hint of opensource @ Lecture room HS i7 |
11:00 Maria Eichlseder Lightweight Cryptography @ Lecture room HS i7 |
11:00 Chelsea Rose Sidrane Neural Network Verification @ Lecture room HS i7 |
11:00 Daniel Gruss Why are there side channels everywhere? @ Lecture room HS i1 |
11:00 Yuval Yarom Microarchitectural Weird Machines @ Lecture room HS i1 |
11:30 – 12:00 | |||||
12:00 – 12:30 | |||||
12:30 – 13:00 | 12:30 Lunch break |
12:30 Lunch break |
12:30 Lunch break |
12:30 Lunch break |
12:30 Goodbye lunch |
13:00 – 13:30 | |||||
13:30 – 14:00 | |||||
14:00 – 14:30 | 14:00 Samuel Ortiz The RISC-V Confidential Computing Architecture @ Lecture room HS i7 |
14:00 Security Week CTF by LosFuzzys Part 1 @ Lecture room HS i7 |
14:00 AI Lab @ Lecture room HS i7 |
14:00 Side-Channel Lab Part 1 @ Lecture room HS i1 |
14:00 Speaker Training (Optional) by Daniel Gruss @ Lecture room HS i1 |
14:30 – 15:00 | |||||
15:00 – 15:30 | |||||
15:30 – 16:00 | 15:30 Coffee break ☕ |
15:30 Coffee break ☕ |
15:30 Social Event 🍫🍷 Visit of the Zotter chocolate factory & Dinner with scientific keynote speech at the traditional styrian Buschenschank Bernhart |
15:30 Coffee break ☕ |
|
16:00 – 16:30 | 16:00 PhD Forum @ Lecture room HS i6 --------------- Industry Forum @ Lecture room HS i7 |
16:00 Security Week CTF by LosFuzzys Part 2 @ Lecture room HS i7 |
16:00 Side-Channel Lab Part 2 @ Lecture room HS i1 |
||
16:30 – 17:00 | |||||
17:00 – 17:30 | |||||
17:30 – 18:00 | |||||
18:00 – 18:30 | 18:00 Welcome Dinner️ |
18:00 Dinner️ |
18:00 Dinner️ |
||
18:30 – 19:00 | |||||
19:00 – 19:30 | |||||
19:30 – 20:00 |
For infos & if you have some questions,
ask our staff or join our Discord server:
A central goal of the school is to enable communication between presenters and the participants. Therefore we will have a so-called PhD forum on Monday.
The basic idea of the forum is that PhD students and researchers present their current research in a 5-minute talk. This will help them to get connected with other participants working on a similar topic. Furthermore, presenting at the PhD forum is a prerequisite for earning optional 2 ECTS.
In this session, you will get hands-on experience with system security, cryptography, web security, and more!
The session will be held as a capture-the-flag competition, where participants must find vulnerabilities in given programs and exploit those vulnerabilities. Upon successful exploitation, you will receive a flag that will reward you with points! This is a great opportunity to network and collaborate with like-minded people to find solutions to security-related problems.
‼️Please bring your own laptop‼️
In this workshop, we will dive into the topic of safe reinforcement learning.
You will train deep reinforcement learning agents in simple but safety-critical environments. To guarantee safe exploration during training, you will compute formal safety shields. The shields will monitor the agent during runtime and prevent the agent from executing any unsafe action. You will gain experience in working with probabilistic model-checking tools by performing the experiments live on your own machine.
‼️Please bring your own laptop‼️
In contrast to runtime attacks, the CPU microarchitecture itself gives much more subtle ways to attack an application via side-channels. These side channels range from measuring execution time and detecting memory access patterns, over cache attacks (e.g., Flush+Reload) to Meltdown and Spectre attacks, leaking information across different processes and privilege boundaries. In this lab, you will experiment with various microarchitectural side channels.
We all got to present at conferences sometime during our PhD, but no one taught us how. This Speaker Training is for you.
We will run through a few simple exercises for speaking, intonation, controlling volume, insecurities and confidence, emotions and thoughts during a presentation, and mastering question and answer sessions eloquently.
‼️The space is limited to about 20 people, so please contact daniel.gruss@iaik.tugraz.at if you want to participate.‼️