计算机学院系列讲座菁英论坛第6期——Software Side Channel Vulnerability Detection

报告题目(Title)Software Side Channel Vulnerability Detection

时间(Date & Time)2023.6.2, 11-12am

地点(Location)理科一号楼1126(燕园校区)

Room 1126, Science Building #1 (Yanyuan)

主讲人(Speaker)Shuai Wang

邀请人(Host)Ding Li

报告摘要(Abstract)

Side-channel attacks recover secret information by analyzing the physical implementation of cryptosystems based on non-functional computational characteristics, e.g. time, power, and acoustic. Among all well-known side channels, cache-based side channels are notoriously severe, leading to practical attacks against certain implementations of theoretically secure crypto algorithms, such as RSA, ElGamal and AES. In this talk, Shuai Wang will give a general introduction about side channel attacks. He will then discuss recent progresses in helping software developers identify vulnerabilities that can lead to side channel attacks under various scenarios, including conventional cryptographic systems and modern cloud-based AI systems.


主讲人简介(Bio)

WechatIMG104

Shuai Wang is currently an assistant professor in the Department of Computer Science & Engineering at Hong Kong University of Science and Technology (HKUST). He earned his Ph.D. degree from Penn State University and B.S. degree from Peking University. His research interests focus on Computer Security and Software Engineering, and his recent research covers side channel analysis, reverse engineering, supply chain security, AI security, and privacy-enhancing techniques. He is the receipt of 2023 Google Research Scholar Award, 2022 and 2019 CCF-Tencent Rhino-Bird Young Faculty Open Research Award, and 2020 HK-UGC Early Career Award. Prior to joining HKUST, he worked at ETH Zurich.

/private/var/folders/v1/k5lm_d210ks4j1_g1xk6qy8c0000gn/T/com.kingsoft.wpsoffice.mac/picturecompress_20230526141659/output_1.jpgoutput_1


CLOSE