報告題目(Title):Software Side Channel Vulnerability Detection
時間(Date & Time):2023.6.2, 11-12am
地點(Location):理科一号樓1126(燕園校區)
Room 1126, Science Building #1 (Yanyuan)
主講人(Speaker):Shuai Wang
邀請人(Host):Ding Li
報告摘要(Abstract):
Side-channel attacks recover secret information by analyzing the physical implementation of cryptosystems based on non-functional computational characteristics, e.g. time, power, and acoustic. Among all well-known side channels, cache-based side channels are notoriously severe, leading to practical attacks against certain implementations of theoretically secure crypto algorithms, such as RSA, ElGamal and AES. In this talk, Shuai Wang will give a general introduction about side channel attacks. He will then discuss recent progresses in helping software developers identify vulnerabilities that can lead to side channel attacks under various scenarios, including conventional cryptographic systems and modern cloud-based AI systems.
主講人簡介(Bio):

Shuai Wang is currently an assistant professor in the Department of Computer Science & Engineering at Hong Kong University of Science and Technology (HKUST). He earned his Ph.D. degree from Penn State University and B.S. degree from Peking University. His research interests focus on Computer Security and Software Engineering, and his recent research covers side channel analysis, reverse engineering, supply chain security, AI security, and privacy-enhancing techniques. He is the receipt of 2023 Google Research Scholar Award, 2022 and 2019 CCF-Tencent Rhino-Bird Young Faculty Open Research Award, and 2020 HK-UGC Early Career Award. Prior to joining HKUST, he worked at ETH Zurich.

歡迎關注beat365微信公衆号,了解更多講座信息!
beat365官方网站
