Since computers are used in every aspect of modern life, many software systems have access to secret information such as financial and medical records of individuals, trade secrets of companies and military secrets of states. Confidentiality, a core computer security attribute, dictates that, a program that manipulates secret information should not reveal that information. This can be hard to achieve if an attacker is able to observe different aspects of program behavior such as execution time and memory usage. Side-channel attacks recover secret information from programs by observing non-functional characteristics of program executions such as time consumed, number of memory accessed or packets transmitted over a network. In this seminar we will discuss automated techniques for side-channel analysis. We will also discuss the use of model counting constraint solvers for side channel analysis, in order to quantify the amount of information leaked from the identified side channels.
Instructor: Tevfik Bultan
Organizational Meeting time: Monday, September 26, 3:00PM
Location: HFH 1152
Enrollment Code: TBD
Units: This will be a 2 unit seminar
Quarter
Faculty Reference
Tevfik Bultan
Course Type
Enrollment Code
74559
Location
TBA
Units
2
Day and Time
TBA
Course Website
Course Description