Program

List of confirmed speakers

  • Maria Eichlseder, TU Graz, Austria (Symmetric Cryptography)
  • Daniel Gruss, TU Graz, Austria (Microarchitectural Side Channels)
  • Nils Jansen, Ruhr-University Bochum, Germany (Safe AI)
  • Wouter Lueks, CISPA, Germany (Privacy)
  • Amir Moradi, TU Darmstadt , Germany (Physical Side Channels)
  • Thomas Prest, PQ Shield, France (Post-Quantum Cryptography)
  • Eduardo Vela, Google, Switzerland (System Security)
  • Yuval Yarom, Ruhr-University Bochum, Germany (Microarchitectural Side Channels)
Monday
23rd Sept.
Tuesday
24th Sept.
Wednesday
25th Sept.
Thursday
26th Sept.
Friday
27th Sept.
9:00 – 09:30 9:00
Thomas Prest

Seeing through the matrix: parameter selection in lattice cryptography
9:00
Nils Jansen

Safe Reinforcement Learning
9:00
Wouter Lueks

Designing Privacy-Friendly Systems
9:00
Amir Moradi
09:30 – 10:00
10:00 – 10:30
10:30 – 11:00 10:30
Welcome Coffee ☕
10:30
Coffee break ☕
10:30
Coffee break ☕
10:30
Coffee break ☕
10:30
Coffee break ☕
11:00 – 11:30 11:00
Eduardo Vela
11:00
Maria Eichlseder

Lightweight Cryptography
11:00
Chelsea Rose Sidrane
11:00
Daniel Gruss
11:00
Yuval Yarom
11:30 – 12:00
12:00 – 12:30
12:30 – 13:00 12:30
Lunch break
12:30
Lunch break
12:30
Lunch break
12:30
Lunch break
12:30
Goodbye lunch
13:00 – 13:30
13:30 – 14:00
14:00 – 14:30 14:00
TBA
14:00
Physical Side-Channels


Lab I
14:00
AI Lab

14:00
Microarchitectural Side-Channels


Lab I
14:30 – 15:00
15:00 – 15:30
15:30 – 16:00 15:30
Coffee break ☕
15:30
Coffee break ☕
15:30
Social Event 🍺
15:30
Coffee break ☕
16:00 – 16:30 16:00
PhD Forum
16:00
Physical Side-Channels


Lab II
16:00
Microarchitectural Side-Channels


Lab II
16:30 – 17:00
17:00 – 17:30
17:30 – 18:00
18:00 – 18:30 18:00
Welcome Dinner️
18:00
Dinner️
18:00
Dinner️
18:30 – 19:00
19:00 – 19:30
19:30 – 20:00
PhD Forum

A central goal of the school is to enable communication between presenters and the participants. Therefore we will have a so-called PhD forum on Monday. The basic idea of the forum is that PhD students and researchers present their current research in a 5-minute talk. This will help them to get connected with other participants working on a similar topic. Furthermore, presenting at the PhD forum is a prerequisite for earning optional 2 ECTS.

Microarchitectural Side-Channels Lab

In contrast to runtime attacks, the CPU microarchitecture itself gives much more subtle ways to attack an application via side-channels. These side channels range from measuring execution time and detecting memory access patterns, over cache attacks (e.g., Flush+Reload) to Meltdown and Spectre attacks, leaking information across different processes and privilege boundaries. In this lab, you will experiment with various microarchitectural side channels.

Physical Side-Channels Lab

In this tutorial you will use physical side-channel attacks to break the security of embedded devices.
First, we will use power analysis attacks and measure the power consumption of a microcontroller while it performs encryptions.
Using the power consumption of the device, we will extract the used encryption key.
Second, we will perform a fault attack and inject voltage spikes and clock glitches into the microcontroller to disturb its computations.
The resulting faults can then be used to bypass security checks or extract secrets.
All the experiments will be performed on a real microcontroller on a ChipWhisperer board, which lets you easily measure the power consumption and inject faults.