Our work titled “MASCAT: Stopping Microarchitectural Attacks Before Execution” has been featured on the Register. http://www.theregister.co.uk/2017/01/04/boffins_bag_sidechannel_bugs_before_they_bite/ Once considered the stuff of laboratories and spies, side-channel attacks have become increasingly practical. Rowhammer, for example, is a software-only way to flip bits in one row of RAM by rapidly writing and re-writing bits in another row. Ultimately, it lets […]
Posts in category Uncategorized
Our work titled “PerfWeb: How to Violate Web Privacy with Hardware Performance Events” has been featured on the Motherboard. https://motherboard.vice.com/en_us/article/mgm4w4/this-spy-app-can-see-if-youve-visited-whistleblowing-sites-on-the-dark-web To stay off the radar when leaking information to the press, whistleblowers often turn to the dark web to mask their identity. But that’s no match for a new malicious app that spies on your computer hardware, […]
SPACE 2017 The Seventh International Conference on Security, Privacy, and Applied Cryptography Engineering will be held in Goa, India, 13th – 17th December 2017. Submissions are due June 30, 2017. We are looking forward to your high-quality submissions on various aspects of security, privacy, applied cryptography, and cryptographic engineering.
Friday, May 26 at 11am in AK 218: Amplifying Side Channels Through Performance Degradation Presenter: Yuval Yarom (University of Adelaide and DATA61, CSIRO) Abstract: Interference between processes executing on shared hardware can be used to mount performance degradation attacks. However, in most cases, such attacks offer little benefit for the adversary. In this talk, I […]
CARDIS 2017 The Sixteenth Smart Card Research and Advanced Application Conference will be held in Lugano, Switzerland, 13 – 15 November 2017. Submissions are due July 21, 2017. We are looking forward to your high-quality submissions on all aspects of the security of smart cards and embedded systems as well as their applications.
Tuesday, April 18 at 11am in AK 218: Exploiting and Mitigating Timing Channels in Microprocessors Presenter: Dmitry Ponomarev (Binghamton University) Abstract: In this talk, we will overview our recent research on exploiting and mitigating timing channels in modern microprocessors. In the first part of the talk, we will present two new covert channels – one […]
Tuesday, October 11 at 2pm in AK 218: Towards Efficient Evaluation of a Time-Driven Cache Attack on Modern Processors Presenter: Andreas Zankl (Fraunhofer AISEC) Abstract: Software implementations of block ciphers are widely used to perform critical operations such as disk encryption or TLS traffic protection. To speed up cipher execution, many implementations rely on pre-computed […]
WPI team wins the first MITRE embedded Capture the Flag! The Collegiate eCTF competition was organized by MITRE and had five competing teams from local universities: Northeastern University, TUFTS University, University of Massachusetts Amherst and WPI. WPI’s team We’re Probably Insecure included graduate and undergraduate students from ECE and CS departments, including Christopher Byrne, Benjamin […]
Friday, September 2 at 11am in AK 218 : Post Quantum Key Exchange based on the learning with errors problems Presenter: Jintai Ding (U. of Cincinnati) Abstract: Public key cryptosystems (PKC) are critical part of the foundation of modern communication systems, in particular, Internet. However Shor’s algorithm shows that the existing PKC like Diffie-Hellmann key […]