Summer School Tutorials

Tutorial Talks

Here are the currently confirmed tutorial talks!

  • Accelerating Cryptography with Open-Source SoCs
  • Lecturer: Patrick Schaumont

  • Abstract: In this tutorial, the audience will get a hands-on introduction to the common mechanisms for cryptographic acceleration using custom hardware in the context of System-on-Chip design, including memory-mapped coprocessors and custom-instruction extensions.

    The objective of this tutorial is to introduce all the steps included in the development of an embedded SoC application configured around the IBEX (RISC-V) processor:

  • Split Happens: How to Defend Against Poisoning Attacks in Split Learning
  • Lecturer: Ahmad-Reza Sadeghi

  • Abstract: Artificial Intelligence and Deep Neural Networks become capable to solve increasingly complex problems across various domains. However, deploying large-scale models in edge environments, such as smartphones with limited computational capacity, presents significant challenges. Split Learning (SL) offers a promising solution by partitioning neural networks between a client and a powerful server, enabling efficient computation while maintaining data privacy. By sharing client-side model components among multiple clients, SL allows collaboration without requiring to share sensitive data.

  • Hypothesis testing for leakage assessment in side channel analysis
  • Lecturer: Ileana Buhan, Senna van Hoek

  • Abstract: While the current standard cryptographic algorithms are secure against known mathematical attacks, practice shows that hardware and software implementations are susceptible to physical attacks. A signicant number of studies show how to recover secrets by monitoring the algorithm's execution using side channel attacks.

  • Where did my RAM go? Using algebraic cryptanalysis in practice
  • Lecturers: Lars Ran, Monika Trimoska

  • Abstract: Given a polynomial system of quadratic equations in multiple variables, the multivariate quadratic (MQ) problem asks to find an assignment of the variables such that all equations in the system evaluate to zero. This is a prominent problem in many fields of mathematics and computer science as it is used as a tool to tackle different challenges. The process generally goes in two phases. First, the challenge in question is modeled as a polynomial system of equations. Then, the resulting system is given to an algebraic solver that outputs a solution to the system, which in turn gives us a solution to the original problem. When this recipe is used in the context of an attack on a cryptographic system, this is referred to as algebraic cryptanalysis.

  • A Brief Introduction to Circuit-Level Hardware Reverse Engineering
  • Lecturers: Julian Speith, Jörn Langheinrich, Maik Ender, Felix Hahn

  • Abstract: The design and manufacturing of microchips includes a wide range of stakeholders that are situated around the world. Ensuring trust in the manufactured microchips is a challenging task that, so far, lacks a comprehensive solution. Hardware reverse engineering (HRE) can serve as one method to verify the absence of malicious modifications in microchips such as hardware trojans, backdoors, or even unintentional vulnerabilities. Beyond verification, HRE may also prove helpful to facilitate the interoperability with and repair of legacy devices and detect IP infringement. However, HRE may also be used by attackers to insert hardware trojans or commit IP theft. Hence, better understanding this threat vector can aid the development of respective countermeasures.

  • Proving Cryptographic Protocols with ProVerif
  • Lecturers: Vincent Cheval , Alexandre Debant

  • Abstract: The verification of cryptographic protocols is essential for ensuring the security and privacy of digital communication systems. Symbolic models, also known as Dolev-Yao models, abstract messages as mathematical terms and have proven highly effective in this domain. Since their creation in the 1980s, numerous verification techniques have been developed for these models to verify a wide range of security properties, such as secrecy, authentication, and anonymity, in increasingly complex cryptographic protocols. This progress has led to the design and development of tools capable of automatically verifying the security of real-world protocols, including TLS, the cryptographic backbone of secure web communications; Signal, a leading secure messaging protocol; 5G-AKA, a critical authentication mechanism for mobile networks; Belenios, a secure e-voting protocol, etc.




Tutorial Lecturers

Here are the currently confirmed lecturers!

#

Patrick Schaumont

Worcester Polytechnic Institute, MA, USA
#

Ahmad-Reza Sadeghi

TU Darmstadt, Germany
#

Ileana Buhan

Radboud University, The Netherlands
#

Senna van Hoek

Radboud University, The Netherlands
#

Monika Trimoska

Eindhoven University of Technology, The Netherlands
#

Lars Ran

Radboud University, The Netherlands
#

Julian Speith

Max Planck Institute for Security and Privacy, Bochum, Germany
#

Jörn Langheinrich

Max Planck Institute for Security and Privacy, Bochum, Germany
#

Maik Ender

Max Planck Institute for Security and Privacy, Bochum, Germany
#

Felix Hahn

Max Planck Institute for Security and Privacy, Bochum, Germany
#

Vincent Cheval

University of Oxford, UK
#

Alexandre Debant

Inria Nancy, France