2018 Summer School -Program

Registration Form

Tuesday, October 02

TIMETOPICSPEAKER
09:00-09:30Gathering
09:30-09:40Greetings
Eli Biham
Mark Silberstein
Yossi Oren
09:40-11:15Software Guard Extension – from dream to reality - Part 1
Slides here
Ittai Anati
11:15-11:40Coffee Break
11:40-13:15Software Guard Extension – from dream to reality - Part 2
Slides here
Ittai Anati
13:15-14:15Lunch Break
14:15-15:50Attacks and Defenses for Intel SGX- Part 1
Slides here
Taesoo Kim
15:50-16:05Coffee Break
16:05-17:40Attacks and Defenses for Intel SGX- Part 2
Slides here
Taesoo Kim

Wednesday, October 03

TIMETOPICSPEAKER
09:00-09:30Gathering
09:30-11:05Application-oriented Security: Secrets Management and Side-Channel Protection for TEEs - Part 1
Slides here
Christof Fetzer
11:05-11:30Coffee Break
11:30-13:05Application-oriented Security: Secrets Management and Side-Channel Protection for TEEs - Part 2
Slides here
Christof Fetzer
13:05-14:05Lunch Break
14:05-15:40The house is built on sand: exploiting hardware glitches and side channels in perfect software - Part 1
Slides here
Herbert Bos
15:40-15:55Coffee Break
15:55-17:30The house is built on sand: exploiting hardware glitches and side channels in perfect software - Part 2
Slides here
Herbert Bos

Thursday, October 04

TIMETOPICSPEAKER
09:00-09:30
09:30-10:15Cache attacks against the Android TrustZoneAvishai Wool
10:15-11:05From black to white (box) attacks on secure systems - Or why do your light bulbs need a firmware update
Slides here
Eyal Ronen
11:05-11:30Coffee Break
11:30-13:05Side Channel Attacks: How a Small Leakage Becomes a Big Problem-Part 1Daniel Genkin
13:05-14:05Lunch Break
14:05-15:40Side Channel Attacks: How a Small Leakage Becomes a Big Problem Part 2Daniel Genkin
15:40-15:55Coffee Break
15:55-16:45Side-Channel Attacks on Human Secrets

Slides Here
Yossi Oren
16:45-17:35What if your phone’s battery could talk? Inference attacks using malicious battery
Slides here
Mark Silberstein