2023
Monday 4th Sept. |
Tuesday 5th Sept. |
Wednesday 6th Sept. |
Thursday 7th Sept. |
Friday 8th Sept. |
|
9:00 - 09:30 |
Cédric Fournet Confidential Computing Aula |
Daniel Gruß Security: Can we afford to have it? Can we afford not to have it? Aula |
Ingrid Verbauwhede Hardware support for security Aula |
F.-X. Standaert Systematizing Side-Channel Security Evaluations Aula |
|
09:30 - 10:00 | |||||
10:00 - 10:30 | Welcome Coffee | ||||
10:30 - 11:00 |
Bart Preneel Cybersecurity and AI Aula |
Coffee Break | Coffee Break | Coffee Break | Coffee Break |
11:00 - 11:30 |
Joppe Bos Post-Quantum Secure Cryptographic Implementations for Embedded Devices Aula |
Thorsten Holz Efficient and Scalable Fuzzing of Complex Software Stacks Aula |
Rayna Dimitrova Safety and Security Guarantees via Algorithmic Verification Aula |
Maria Eichlseder Lightweight Cryptography: Security under Challenging Conditions Aula |
|
11:30 - 12:00 |
Christof Paar How I Learned to Stop Worrying and Love Hardware Trojans Aula |
||||
12:00 - 12:30 | |||||
12:30 - 1:00 |
Lunch Break Lecture theatre II |
Lunch Break Lecture theatre II |
Lunch Break Lecture theatre II |
Lunch Break Lecture theatre II |
Lunch Break Lecture theatre II |
1:00 - 1:30 | |||||
1:30 - 2:00 | |||||
2:00 - 2:30 |
Cas Cremers Secure building blocks do not make a secure app: How to ensure strong security guarantees for communicating systems? Aula |
Shmuel Ur Inventing in Security, Examples, and Patent Strategies Aula |
Stefan Gast, Lukas Giner Microarchitectural Side-Channels Lab I Lecture theatre I |
Barbara Gigerl, Gaetan Cassiers, Rishub Nagpal Physical Side-Channels Lab I Lecture theatre I |
Johannes Haring, Vedad Hadžić, Marcel Nageler Runtime Security Lab II Lecture theatre VI |
2:30 - 3:00 | |||||
3:00 - 3:30 | Coffee Break | ||||
3:30 - 4:00 |
PHD Forum seminar room „Verkehrswesen“ (AT02038), seminar room AT01036, lecture room I, lecture room VI, ------ Industry Forum Aula |
Coffee Break | Coffee Break | Coffee Break | |
4:00 - 4:30 |
Johannes Haring, Vedad Hadžić, Marcel Nageler Runtime Security Lab I Lecture theatre I |
Stefan Gast, Lukas Giner Microarchitectural Side-Channels Lab II Lecture theatre I |
Barbara Gigerl, Gaetan Cassiers, Rishub Nagpal Physical Side-Channels Lab II Lecture theatre I |
||
4:30 - 5:00 | |||||
5:00 - 5:30 | |||||
5:30 - 6:00 |
Dinner Lecture theatre II |
Social Event and keynote speech |
Dinner Lecture theatre II |
||
6:00 - 6:30 | Welcome Dinner | ||||
6:30 - 7:00 | |||||
7:00 - 7:30 | |||||
7:30 - 8:00 | |||||
8:00 - 8:30 | |||||
8:30 -9:00 | |||||
9:00 - 9:30 |
PhD Forum
A central goal of the school is to enable communication between presenters and the participants. Therefore we will have a so-called PhD forum on Monday and Tuesday. The basic idea of the forum is that PhD students and researchers present their current research in a 5-minute talk. This will help them to get connected with other participants working on a similar topic. Furthermore, presenting at the PhD forum is a prerequisite for earning optional 2 ECTS.
Runtime Security Lab (Capture the Flag)
In this tutorial, you will learn about runtime security and what can go wrong if memory is accessed out of bounds, integers do overflow, etc.
Do you manage to read or modify protected memory? Can you manipulate the control flow to jump to a protected function? During a Capture-the-Flag competition, you will learn to attack vulnerable applications. If your attack is successful, the application will reveal a secret flag to you, for which you get points. Rumor has it that the best teams will be rewarded. Please bring your own laptop.
Physical Side-Channels Lab
In this tutorial you will use physical side-channel attacks to break the security of embedded devices.
First, we will use power analysis attacks and measure the power consumption of a microcontroller while it performs encryptions.
Using the power consumption of the device, we will extract the used encryption key.
Second, we will perform a fault attack and inject voltage spikes and clock glitches into the microcontroller to disturb its computations.
The resulting faults can then be used to bypass security checks or extract secrets.
All the experiments will be performed on a real microcontroller on a ChipWhisperer borard, which lets you easily measure the power consumption and inject faults.
Microarchitectural Side-Channels Lab
In contrast to runtime attacks, the CPU microarchitecture itself gives much more subtle ways to attack an application via side-channels. These side channels range from measuring execution time and detecting memory access patterns, over cache attacks (e.g., Flush+Reload) to Meltdown and Spectre attacks, leaking information across different processes and privilege boundaries. In this lab, you will experiment with various microarchitectural side channels.