Worcester Polytechnic Institute

Posts in category Uncategorized

Upcoming Seminar: Dan Walters

Upcoming Seminar: Dan Walters

Thursday, March 5 at 3pm in AK 233: SLEAK: A Side-channel Leakage Evaluator and Analysis Kit Presenter: Dan Walters (MITRE) Abstract: Side-channel attacks (SCA) present a major threat to secure embedded systems. Effective software countermeasures against SCA are well known in theory, but in practice are difficult to implement properly due to issues such as […]

Upcoming Seminar: Daniel Holcomb

Upcoming Seminar: Daniel Holcomb

Thursday, February 26 at 3pm in AK 233: SRAM-based Physical Unclonable Functions Presenter: Daniel Holcomb (UMass Amherst) Abstract: This talk presents our research into SRAM-based Physical Unclonable Functions (PUFs). PUFs are circuits that use the inherent process variations of each chip to generate unique identifiers or secret keys. SRAM circuits are well-suited for use in […]

Upcoming Seminar: Sandip Kundu

Upcoming Seminar: Sandip Kundu

Thursday, February 12 at 3pm in AK 233: Improving Uniqueness and Modeling Attack Resistance of Strong PUFs Presenter: Sandip Kundu (UMass Amherst) Abstract: Hardware authentication is fundamentally concerned with establishing the authenticity of smart tags or system components including the provenance of ICs throughout its lifecycle. Physically Unclonable Functions (PUFs) are promising for low-cost authentication […]

Upcoming Seminar: Mostafa Taha

Upcoming Seminar: Mostafa Taha

Thursday, July 3 at 11am in AK 218: Advances in the Side-Channel Analysis of Symmetric Cryptography Presenter: Mostafa Taha (Worcester Polytechnic Institute) Abstract: Practical countermeasures against Side-Channel Attacks (Hiding and Masking) typically require at least doubling the implementation area or the computation time. Yet, they do not provide perfect protection. They only make it harder […]

Upcoming Seminar: Murat Kantarcioglu

Upcoming Seminar: Murat Kantarcioglu

Friday, April 30 at 11am in AK 108: Access Pattern Disclosure Attacks against Searchable Encryption Schemes Presenter: Murat Kantarcioglu (University of Texas at Dallas) Abstract: With the advent of cloud computing, outsourcing data to cloud providers is becoming more popular due to the lower cost and increased flexibility. At the same time, concerns related to […]

LightSEC 2014 – Call for Papers

LightSEC 2014 – Call for Papers

The Third International Workshop on Lightweight Cryptography for Security & Privacy (LightSEC 2014) will be held on September 1-2, 2014 at Istanbul Commerce University, right at the bank of the Bosphorus, on the Historic Peninsula of Istanbul, Turkey. http://www.light-sec.org Submission Deadline : June 1, 2014 See also the full Call for Papers

Upcoming Seminar: Adam Ding

Upcoming Seminar: Adam Ding

On Friday, April 18 at 12noon in SL 104: Algorithmic Confusion Analysis of Higher Order DPA against Masking Protected Devices Presenter: Adam Ding (Northeastern University) Abstract: Masking the internal operations with random numbers is a popular countermeasure to protect cryptographic systems against differential power analysis (DPA). Higher order DPA can be used to break the […]

Sub-Transistor Level Hardware Trojans

Sub-Transistor Level Hardware Trojans

On Wednesday, April 16 at 11 am in AK 219: Sub-Transistor Level Hardware Trojans Presenter: Christof Paar (Ruhr-Universit√§t Bochum & UMASS Amherst) Abstract: Countless systems ranging from consumer electronics to military equipment are dependent on integrated circuits (ICs). A surprisingly large number of such systems are already security critical, e.g., medical devices, automotive electronics, or […]

Open Faculty Position in Security Eng...

Open Faculty Position in Security Engineering

Worcester Polytechnic Institute (WPI) invites applications for a faculty position in the Department of Electrical & Computer Engineering at all ranks, commensurate with qualifications. Required qualifications for the position include; an earned Ph.D. in Electrical & Computer Engineering, or a closely related field. Areas of particular interest include, but are not limited to: security engineering, […]

Cache Attacks: How They Work and What...

Cache Attacks: How They Work and What to do About Them

Thursday, Dec. 12 at 4 pm in AK-219: Presenter: Prof. Erkay Savas (Sabanci University) Abstract: Cache attacks are shown to be effective side-channel attacks that use cache access patterns of a cryptographic algorithm during execution. The cryptographic algorithms using lookup table approach for acceleration are especially vulnerable to cache attacks. Depending on the available information […]