Monday 16. September |
Tuesday 17. September |
Wednesday 18. September |
Thursday 19. September |
Friday 20. September |
|
---|---|---|---|---|---|
8:40 | Welcome | ||||
9:00 – 10:30 | Mathias Payer From Crashes to Attacks: Synthesizing Exploits |
Katharina Krombholz
A User-Centric Approach to Securing the HTTPS Ecosystem |
Michael Schwarz
Microarchitectural Side-Channel Attacks |
Bart Preneel
The Impact of Quantum Computers on Cybersecurity |
Maria Eichlseder
Effective Attacks from Ineffective Faults |
10:30 – 11:00 | Coffee | Coffee | Coffee | Coffee | Coffee |
11:00 – 12:30 | Michael Schwarz Runtime Security Lab I |
Peter Schwabe
Implementing Post-quantum Cryptography on Embedded Microcontrollers |
Elisabeth Oswald | Andrei Sabelfeld
Securing IoT Apps |
Peter Pessl, Robert Primas, Michael Schwarz Side-Channel Lab II , |
12:30 – 14:00 | Lunch | Lunch | Lunch | Lunch | Lunch |
14:00 – 15:30 | Byron Cook
Reasoning about the security of AWS |
PhD Forum |
Peter Pessl, Robert Primas, Michael Schwarz Side-Channel Lab I , |
Matteo Maffei
Cryptographic and semantic foundations of smart contracts |
|
15:30 – 16:00 | Coffee | Coffee | Coffee | ||
16:00 – 17:00 | PhD Forum |
Social Event | Bart Preneel
Keynote – Is Blockchain Dead? |
Michael Schwarz Runtime Security Lab II |
|
Welcome Dinner | Dinner | Lab Night + Dinner |
PhD Forum
A central goal of the school is to enable communication between presenters and the participants. Therefore we will have a so-called PhD forum on Monday and Tuesday. The basic idea of the forum is that PhD students and researchers present their current research in a 5-minute talk. This will help them to get connected with other participants working on a similar topic. Furthermore, presenting at the PhD forum is a prerequisite for earning optional 2 ECTS.
Runtime Security Lab
In this tutorial, you will learn about runtime security and what can go wrong if memory is accessed out of bounds, integers do overflow, etc.
Do you manage to read or modify protected memory? Can you manipulate the control flow to jump to a protected function? During a Capture-the-Flag competition, you will learn to attack vulnerable applications. If your attack is successful, the application will reveal a secret flag to you, for which you get points. Rumor has it that the best teams will be rewarded. Please bring your own laptop.
You can find the slides and other material here.
Side-Channel Lab
During the side-channel labs, we offer two parallel sessions to choose from. First, physical side channels and faults, and second, microarchitectural side channels. Please bring your own laptop.
Physical Side-Channels
In this tutorial, you will learn how the physical properties of embedded devices can be used to break their security. First, we will measure the power consumption of a microcontroller performing encryptions and use that to extract the used secret key. Second, we will inject voltage spikes and clock glitches into the microcontroller and thus disturb its computations. The resulting faults can then be used to bypass security checks or extract secrets. All your experiments will be performed on a real device: you will receive a ChipWhisperer-Lite board, which lets you easily measure the power consumption and inject faults on an included target microcontroller.
You can find slides here.
Microarchitectural Side-Channels
In contrast to runtime attacks, the CPU microarchitecture itself gives much more subtle ways to attack an application via side-channels. These side channels range from measuring execution time and detecting memory access patterns, over cache attacks (e.g., Flush+Reload) to Meltdown and Spectre attacks, leaking information across different processes and privilege boundaries. In this lab, you will experiment with various microarchitectural side channels.
You can find more material here.