Overview
Explore the critical intersection of cryptography and cybersecurity in the age of Spectre vulnerabilities through this 15-minute IEEE presentation. Delve into the challenges posed by speculative execution attacks, understand the concept of constant-time programming, and learn about innovative approaches to high-assurance cryptography. Discover verification techniques, performance considerations, and developer tools designed to enhance cryptographic implementations' resilience against side-channel attacks. Gain valuable insights into securing modern cryptographic systems in an era of evolving hardware vulnerabilities.
Syllabus
Introduction
The Big Four
The Problem
The Approach
What is Constant Time
Speculative Execution Semantics
Verification
Extensions
Performance
Developer Verification
Conclusion
Taught by
IEEE Symposium on Security and Privacy