Secure Computation in the Real World

04/01/2018 - 12:00

The security of any system is only as good as its weakest link. Even if the system's security is theoretically proven under some set of assumptions, when faced with real-word adversaries, many of these assumptions become flaky, inaccurate and often completely incorrect.

In this talk I will present two cases for bringing this gap between security theory and security practice:

* Utilizing unintentional and abstraction-defying side-channel leakage from physical computing devices in order to extract secret cryptographic keys and the relation of these attacks to leakage resilient cryptography.

* Constructing and deploying secure computation schemes for arbitrary C programs.

The talk will discuss cryptographic techniques and will include live demonstrations.