The introduction of commodity Internet of Things (IoT) devices that integrate physical processes with digital connectivity has changed the way we live. Yet, while industry and users have embraced the systems supporting IoT, the technical community has limited capability to evaluate and ultimately enforce the correct operation of IoT implementations. As a consequence, software design […]
You are browsing archives for
Worcester Polytechnic Institute Assistant/Associate/Full Professor Worcester Polytechnic Institute (WPI) is inviting applications for a tenure track faculty position in the Department of Electrical and Computer Engineering at the Assistant, Associate, or Full Professor level. The successful candidate will have a strong background in the broad area of Cybersecurity and privacy, with expertise subdomains including Blockchains […]
Our work titled “MASCAT: Stopping Microarchitectural Attacks Before Execution” has been featured on the Register. http://www.theregister.co.uk/2017/01/04/boffins_bag_sidechannel_bugs_before_they_bite/ Once considered the stuff of laboratories and spies, side-channel attacks have become increasingly practical. Rowhammer, for example, is a software-only way to flip bits in one row of RAM by rapidly writing and re-writing bits in another row. Ultimately, it lets […]
Our work titled “PerfWeb: How to Violate Web Privacy with Hardware Performance Events” has been featured on the Motherboard. https://motherboard.vice.com/en_us/article/mgm4w4/this-spy-app-can-see-if-youve-visited-whistleblowing-sites-on-the-dark-web To stay off the radar when leaking information to the press, whistleblowers often turn to the dark web to mask their identity. But that’s no match for a new malicious app that spies on your computer hardware, […]
SPACE 2017 The Seventh International Conference on Security, Privacy, and Applied Cryptography Engineering will be held in Goa, India, 13th – 17th December 2017. Submissions are due June 30, 2017. We are looking forward to your high-quality submissions on various aspects of security, privacy, applied cryptography, and cryptographic engineering.
Friday, May 26 at 11am in AK 218: Amplifying Side Channels Through Performance Degradation Presenter: Yuval Yarom (University of Adelaide and DATA61, CSIRO) Abstract: Interference between processes executing on shared hardware can be used to mount performance degradation attacks. However, in most cases, such attacks offer little benefit for the adversary. In this talk, I […]
CARDIS 2017 The Sixteenth Smart Card Research and Advanced Application Conference will be held in Lugano, Switzerland, 13 – 15 November 2017. Submissions are due July 21, 2017. We are looking forward to your high-quality submissions on all aspects of the security of smart cards and embedded systems as well as their applications.
Tuesday, April 18 at 11am in AK 218:Exploiting and Mitigating Timing Channels in Microprocessors Presenter: Dmitry Ponomarev (Binghamton University) Abstract: In this talk, we will overview our recent research on exploiting and mitigating timing channels in modern microprocessors. In the first part of the talk, we will present two new covert channels – one through […]
Tuesday, October 11 at 2pm in AK 218:Towards Efficient Evaluation of a Time-Driven Cache Attack on Modern Processors Presenter: Andreas Zankl (Fraunhofer AISEC) Abstract: Software implementations of block ciphers are widely used to perform critical operations such as disk encryption or TLS traffic protection. To speed up cipher execution, many implementations rely on pre-computed lookup […]
WPI team wins the first MITRE embedded Capture the Flag! The Collegiate eCTF competition was organized by MITRE and had five competing teams from local universities: Northeastern University, TUFTS University, University of Massachusetts Amherst and WPI. WPI’s team We’re Probably Insecure included graduate and undergraduate students from ECE and CS departments, including Christopher Byrne, Benjamin […]