Worcester Polytechnic Institute

Posts by sunar

NETWORKWORLD article on our work

NETWORKWORLD article on our work

For the link click here.

The Register article on our cross-VM ...

The Register article on our cross-VM RSA attack

To read article click here

Upcoming Seminar: Sandip Kundu

Upcoming Seminar: Sandip Kundu

Thursday, February 12 at 3pm in AK 233: Improving Uniqueness and Modeling Attack Resistance of Strong PUFs Presenter: Sandip Kundu (UMass Amherst) Abstract: Hardware authentication is fundamentally concerned with establishing the authenticity of smart tags or system components including the provenance of ICs throughout its lifecycle. Physically Unclonable Functions (PUFs) are promising for low-cost authentication […]

Upcoming Seminar: Murat Kantarcioglu

Upcoming Seminar: Murat Kantarcioglu

Friday, April 30 at 11am in AK 108: Access Pattern Disclosure Attacks against Searchable Encryption Schemes Presenter: Murat Kantarcioglu (University of Texas at Dallas) Abstract: With the advent of cloud computing, outsourcing data to cloud providers is becoming more popular due to the lower cost and increased flexibility. At the same time, concerns related to […]

Cache Attacks: How They Work and What...

Cache Attacks: How They Work and What to do About Them

Thursday, Dec. 12 at 4 pm in AK-219: Presenter: Prof. Erkay Savas (Sabanci University) Abstract: Cache attacks are shown to be effective side-channel attacks that use cache access patterns of a cryptographic algorithm during execution. The cryptographic algorithms using lookup table approach for acceleration are especially vulnerable to cache attacks. Depending on the available information […]

Beehive: Large-Scale Log Analysis for...

Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks

Thursday, Nov. 14 at 4 pm in AK-219: Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks Presenter: Dr. Alina Oprea (RSA Laboratories) Abstract: Currently, many organizations keep large volumes of log data collected by various security products. This data is mostly used today for forensic analysis once an attack has been discovered […]

VERNAM Lab is Co-organizing CHES 2013...

VERNAM Lab is Co-organizing CHES 2013 in Santa Barbara

The 15th Workshop on Cryptographic Hardware and Embedded Systems will be held at UC Santa Barbara, California, USA on August 20 – 23, 2013 in conjunction with CRYPTO 2013. Find the call for papers here.