Materials for the seminar, including the list of articles that we discuss, is available in the internal area.
In this seminar we will discuss research articles on different aspects of side-channel attacks on software as well as countermeasures against them. Exemplary topics include:
Read how you can exploit acoustic side channels to extract private keys from RSA! |
You can access PDFs of these articles from the university network. Further articles will be announced during the preparation meeting. We will consider articles from prime conferences in security in order to ensure interesting, significant, high-quality content.
After successfully participating in this seminar you will know the concept and examples of side-channel attacks on software. You will understand the severity of side-channel vulnerabilities, their pervasiveness, and how to protect selected systems against them. You will have improved you skills in reading and understanding scientific articles, in presenting scientific results, and in discussing and comparing of approaches.
Knowledge of Computer Science equivalent to the first four semesters in the Computer Science Bachelor program.
Last modified on 2 December 2016.