Monday 26.September |
Tuesday
27.September |
Wednesday
28.September |
Thursday
29.September |
Friday
30.September |
|
8:40 | Welcome | ||||
9:00 – 10:30 |
Daniel Gruß Security: Can we afford to have it? Can we afford not to have it? Inffg. 16b, Lecture room i12 |
Samuel Pagliarini Hardware Trojan Horses: from Theory to Practice Inffg. 13, Lecture room i9 |
Ilaria Chillotti Introduction to Fully Homomorphic Encryption and Applications. Inffg. 13, Lecture room i9 |
Thomas Eisenbarth The many Flavors of Side Channel Analysis Inffg. 12, Lecture room i2 |
Peter Schwabe Engineering High-Assurance Crypto Software Inffg. 12, Lecture room i2 |
10:30 – 11:00 | Coffee | Coffee | Coffee | Coffee | Coffee |
11:00 – 12:30 |
Andrea Fioraldi Modern Fuzzing Research and Engineering Inffg. 16b, Lecture room i12 |
Anders Fogh Product Security Inffg. 13, Lecture room i9 |
Matteo Maffei Computer-Aided Formal Security Analysis of the Web Platform Inffg. 13, Lecture room i9 |
Elisabeth Oswald Techniques and Schemes to Evaluate Side Channel Resilience Inffg. 12, Lecture room i2 |
Jo Van Bulck Privileged Side-Channel Attacks on Trusted Execution Environments Inffg. 12, Lecture room i2 |
12:30 – 14:00 | Lunch | Lunch | Lunch | Lunch | Lunch |
14:00 – 15:30 |
Martin Schwarzl & Stefan Gast Microarchitectural Side-Channels Lab I Inffg. 16b, Lecture room i12 |
Martin Schwarzl & Stefan Gast Microarchitectural Side-Channels Lab II Inffg. 13, Lecture room i9 |
Michael Pehl Design and Assessment of Physical Unclonable Functions Inffg. 13, Lecture room i9 |
Barbara Gigerl & Robert Primas Physical Side-Channels Lab I Inffg. 12, Lecture room i2 |
Johannes Haring, Marcel Nageler & Martin Unterguggenberger Runtime Security Lab II (CTF) Inffg. 12, Lecture room i2 |
15:30 – 16:00 | Coffee | Coffee | Coffee | ||
16:00 – 17:30 |
Alberto Larrauri Borroto, Robert Schilling & Sujoy Sinha Roy PHD Forum Inffg. 11, Lecture room FSI 1 |
Johannes Haring, Marcel Nageler & Martin Unterguggenberger Runtime Security Lab I (CTF) Inffg. 13, Lecture room i9 |
Social Event |
Barbara Gigerl & Robert Primas Physical Side-Channels Lab II Inffg. 12, Lecture room i2 |
|
17:30 | Welcome Dinner | Paper-Generator Dinner | Dinner |
Recorded presentations
Recorded presentation videos are available to the registered participants only — click here to watch the videos.
Presentation slides
Presentation slides of the lectures are available here.
Links to join online
Monday:
- Monday Lecture 1: 9:00am – 10:30am: Daniel Gruß
- Monday Lecture 2: 11:00am – 12:30am: Andrea Fioraldi
- Monday Lab 1: 2:00pm – 3:30pm: Microarchitectural Side-Channels Lab I
- Monday PhD forum: 4:00pm – 5:30pm
Tuesday:
- Tuesday Lecture 1: 9:00am – 10:30am: Samuel Pagliarini
- Tuesday Lecture 2: 11:00am – 12:30pm: Anders Fogh
- Tuesday Lab 1: 2:00pm – 3:30pm: Microarchitectural Side-Channels Lab II
- Tuesday Lab 2: 4:00pm – 5:30pm: Runtime Security Lab I (CTF)
Wednesday:
- Wednesday Lecture 1: 9:00am – 10:30 am: Ilaria Chillotti
- Wednesday Lecture 2: 11:00am – 12:30am: Matteo Maffei
- Wednesday Lecture 3: 2:00pm – 3:30pm: Michael Pehl
Thursday:
- Thursday Lecture 1: 9:00am – 10:30am: Thomas Eisenbarth
- Thursday Lecture 2: 11:00am – 12:30pm: Elisabeth Oswald
- Thursday Lab 1: 2:00pm – 3:30pm : Physical Side-Channels Lab I
- Thursday Lab 2: 4:00pm – 5:30pm : Physical Side-Channels Lab II
Friday:
- Friday Lecture 1: 9:00am – 10:30am: Peter Schwabe
- Friday Lecture 2: 11:00am – 12:30 pm: Jo Van Bulck
- Friday Lab 1: 2:00pm-3:30pm: Runtime Security Lab II (CTF)
PhD Forum
A central goal of the school is to enable communication between presenters and the participants. Therefore we will have a so-called PhD forum on Monday and Tuesday. The basic idea of the forum is that PhD students and researchers present their current research in a 5-minute talk. This will help them to get connected with other participants working on a similar topic. Furthermore, presenting at the PhD forum is a prerequisite for earning optional 2 ECTS.
Paper-Generator Dinner
We all look for interesting research topics to work on. Unfortunately, having a research idea that could end up in a paper can be quite difficult. In this session, we will collaboratively come up with things that no one has thought of yet and figure out which of them are promising ideas for actual papers. We’ll then create teams for each paper and give you the opportunity to figure out and discuss whether and how the idea could actually be turned into a paper.
Runtime Security Lab (Capture the Flag)
In this tutorial, you will learn about runtime security and what can go wrong if memory is accessed out of bounds, integers do overflow, etc.
Do you manage to read or modify protected memory? Can you manipulate the control flow to jump to a protected function? During a Capture-the-Flag competition, you will learn to attack vulnerable applications. If your attack is successful, the application will reveal a secret flag to you, for which you get points. Rumor has it that the best teams will be rewarded. Please bring your own laptop.
Physical Side-Channels Lab
In this tutorial you will use physical side-channel attacks to break the security of embedded devices.
First, we will use power analysis attacks and measure the power consumption of a microcontroller while it performs encryptions.
Using the power consumption of the device, we will extract the used encryption key.
Second, we will perform a fault attack and inject voltage spikes and clock glitches into the microcontroller to disturb its computations.
The resulting faults can then be used to bypass security checks or extract secrets.
All the experiments will be performed on a real microcontroller on a ChipWhisperer borard, which lets you easily measure the power consumption and inject faults.
Microarchitectural Side-Channels Lab
In contrast to runtime attacks, the CPU microarchitecture itself gives much more subtle ways to attack an application via side-channels. These side channels range from measuring execution time and detecting memory access patterns, over cache attacks (e.g., Flush+Reload) to Meltdown and Spectre attacks, leaking information across different processes and privilege boundaries. In this lab, you will experiment with various microarchitectural side channels.