Summer School Tutorials

Tutorial Talks

Here are the currently confirmed tutorial talks!

  • An Introduction to Game-Based Cryptographic Proofs with the CryptoVerif Proof Assistant
    Slides I Slides II Extra
  • Lecturers: Benjamin Lipp, Charlie Jacomme

  • Abstract: Provable security provides the strongest assurance of cryptographic security on the specification level of a cryptosystem. However, writing and verifying proofs is a delicate task. Automated tools can help reduce errors and reviewing load.

  • Implementing Cryptography on Microcontrollers
    Slides 1 Slides 2 Slides 3 Slides 4 Slides 5 Extra
  • Lecturers: Matthias J. Kannwischer, Bo-Yin Yang

  • Abstract: In this tutorial, we will cover the basics of implementing cryptography on embedded microcontrollers with a focus on the widely used Arm Cortex-M4 microcontroller.

  • Practical Side-Channel Attacks on Real-World ECDSA Implementations
    Slides
  • Lecturers: Ján Jančár, Łukasz Chmielewski

  • Abstract: This tutorial covers the topic of the side-channel analysis (SCA) on implementations of one of the most commonly-used nowadays digital signature schemes, namely, Elliptic Curve Digital Signature Algorithm (ECDSA), which is used in the TLS protocol, document signing, and blockchain applications (e.g., the Bitcoin protocol), among others. Since the tutorial is hands-on we provide the participants with exercises, including a side-channel attack on ECDSA running on a simple embedded target.

  • Hypothesis testing for leakage assessment in side channel analysis
    Slides
  • Lecturer: Ileana Buhan

  • Abstract: While the current standard cryptographic algorithms are secure against known mathematical attacks, practice shows that hardware and software implementations are susceptible to physical attacks. A significant number of studies show how to recover secrets by monitoring the algorithm's execution using side channel attacks.

  • Building Cryptographic ASICs with Open Source Design Tools
    Slides
  • Lecturer: Patrick Schaumont

  • Abstract: Hardware design is increasingly embracing open-source practices, a trend as significant for hardware as the open-source movement has been for software. Open-source plays a crucial role in the cryptographic field, where it is used in cryptographic standard development and for secure connectivity through standard libraries. Open-source electronic design automation (EDA) tools now cover all aspects of Application-Specific Integrated Circuit (ASIC) design, from design capture to tape-out. Additionally, open-source libraries and process design kits (PDKs) offer a fully open-source option for prototyping chips.

  • Lightweight Privacy-Preserving Machine Learning Techniques for IoT Devices
    Slides
  • Lecturer: Nader Sehatbakhsh

  • Abstract: Privacy-preserving methods, ranging from complex encryption-based methods to pure encoding techniques have gained significant popularity in recent years. The goal of this tutorial is to explore state-of-the-art methods for privacy-preserving machine learning. This is achieved by first providing a brief background on existing methods and then reviewing the state-of-the-art for each method. To further explore the existing solutions, we then systematically compare them using different important metrics such as privacy and accuracy. A particular focus will be put on the applicability of these techniques to resource-constrained IoT devices by analyzing various additional metrics such as power and memory overhead incurred on an IoT device to achieve privacy.

  • The Hitchhiker’s Guide to the Security and Privacy of Federated Learning
  • Lecturer: Ahmad-Reza Sadeghi

  • Abstract: The widespread and increasing deployment of Artificial Intelligence (AI), also enlarges the attack surface and requires new security and privacy-enhancing methodologies and technologies. One approach that has been gaining significant growth in recent years is Federated Learning (FL), which enables multiple parties to collaborate in training a neural network model while maintaining the privacy of their individual data.

  • Tamarin Prover Tutorial
    Slides 1 Slides 2 Slides 3 Slides 4 Extra 1 Extra 2 Extra 3
  • Lecturers: Cas Cremers, David Basin

  • Abstract: The Tamarin prover is a state-of-the-art automated security protocol analysis tool that can be used to prove protocol properties and also automatically find attacks. Tamarin has been successfully used to analyze multiple versions of TLS 1.3, the mobile communication standard 5G, group key agreement protocols, the EMV chip-and-pin standard, as well as many other protocols, leading to the discovery of subtle attacks and/or automated proofs.




Tutorial Lecturers

Here are the currently confirmed lecturers!

#

Benjamin Lipp

Max Planck Institute for Security and Privacy, Germany
#

Charlie Jacomme

Inria Paris, France
#

Matthias J. Kannwischer

Institute of Information Science of Academia Sinica, Taipei, Taiwan
#

Bo-Yin Yang

Institute of Information Science of Academia Sinica, Taipei, Taiwan
#

Ján Jančár

Centre for Research on Cryptography and Security (CRoCS), Masaryk University, Brno, Czech Republic
#

Łukasz Chmielewski

Centre for Research on Cryptography and Security (CRoCS), Masaryk University, Brno, Czech Republic
#

Ileana Buhan

Radboud University, The Netherlands
#

Patrick Schaumont

Worcester Polytechnic Institute, MA, USA
#

Nader Sehatbakhsh

University of California, LA, USA
#

Ahmad-Reza Sadeghi

TU Darmstadt, Germany
#

Cas Cremers

CISPA Helmholtz Center for Information Security in Saarbruecken, Germany
#

David Basin

ETH Zurich, Switzerland