Date | Reading | Presenter |
---|---|---|
Mon Jan. 14 |
How
to Read a Paper, S. Keshav, University of Waterloo, 2013. Writing reviews for systems conferences, Timothy Roscoe, ETH Zurich 2007. |
|
SPECS: A Lightweight Runtime Mechanism for Protecting
Software from Security Critical Processor Bugs M. Hicks, C. Sturton, S.T. King, J.M. Smith. ASPLOS 2015. |
Cynthia Sturton | |
Mon Jan. 21 |
Dr. Martin Luther King Jr. Day | |
Mon Jan. 28 |
Identifying Security Critical Properties for the Dynamic Verification of a Processor R. Zhang, N. Stanley, C. Griggs, A. Chi, C. Sturton. ASPLOS 2017. |
Rui Zhang |
Mining Security Critical Linear Temporal Logic Specifications for Processors C. Deutschbein, C. Sturton. MTV 2018. |
Calvin Deutschbein |
|
Mon Feb. 4 |
Groups Due | |
End-to-End Automated Exploit Generation for Validating the Security of Processor Designs R. Zhang, C. Deutschbein, P. Huang, C. Sturton. MICRO 2018. |
Rui Zhang |
|
A Recursive Strategy for Symbolic Execution to Find Exploits in Hardware Designs R. Zhang, C. Sturton. FMS 2018. |
||
Mon Feb. 11 |
Differential
Power Analysis P. Kocher, J. Jaffe, B. Jun. CRYPTO 1999. |
Asher Scott [lecture notes] |
Cache-timing attacks on AES D.J. Bernstein. 2005. |
Asher Scott [lecture notes] |
|
Mon Feb. 18 |
FLUSH+RELOAD: A High
Resolution, Low Noise, L3 Cache Side-Channel Attack Y. Yarom, K. Falkner. USENIX 2014. |
Andrew Vitkus [lecture notes] |
New Cache Designs for
Thwarting Software Cache-based Side Channel Attacks Z. Wang, R. B. Lee. ISCA 2007. |
Yufeng Gong [lecture notes] |
|
Mon Feb. 25 |
Project Proposals Due | |
Spectre Attacks: Exploiting
Speculative Execution P. Kocher et al. 2018. |
Andrew Vitkus [lecture notes] |
|
Meltdown: Reading Kernel Memory from User
Space M. Lipp et al. 2018. |
Kedrian James [lecture notes] |
|
Mon Mar. 4 |
DAWG: A
Defense Against Cache Timing Attacks in Speculative Execution
Processors V. Kiriansky, I. Lebedev, S. Amarasinghe, S. Devadas, J. Emer. MICRO 2018. |
Kedrian James [lecture notes] |
CheckMate:
Automated Synthesis of Hardware Exploits and Security Litmus
Tests C. Trippel, D. Lustig, M. Martonosi. MICRO 2018. |
Joshua Bakita [lecture notes] |
|
Mon Mar. 11 |
Spring Break | |
Mon Mar. 18 |
Sanctum: Minimal Hardware Extensions for Strong Software IsolationV. Costan, I. Lebedev, S. Devadas. USENIX 2016. | Dylan Tastet [lecture notes] |
A Formal Foundation for
Secure Remote Execution of Enclaves P. Subramanyan, R. Sinha, I. Lebedev, S. Devadas, S. A. Seshia. CCS 2017. |
Mac Malone [lecture notes] |
|
Mon Mar. 25 |
Foreshadow:
Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order
Execution J. Van Bulck et al. USENIX 2018. |
Greg Sanders [lecture notes] |
Kami: a Platform for
High-level Parametric Hardware Specification and Its Modular
Verification J. Choi, M. Vijayaraghavan, B. Sherman, A. Chlipala, Arvind. ICFP 2017. |
Mac Malone [lecture notes] |
|
Mon Apr. 1 |
Progress Report Due | |
An Embedded True Random
Number Generator for FPGAs P. Kohlbrenner, K. Gaj. FPGA 2004. |
Yufeng Gong [lecture notes] |
|
A
Provable-Security Analysis of Intel’s Secure Key RNG T. Shrimpton, R. S. Terashima. EUROCRYPT 2015. |
Joshua Bakita [lecture notes] |
|
Mon Apr. 8 |
A2:
Analog Malicious Hardware K. Yang, M. Hicks, Q. Dong, T. Austin, D. Sylvester. SP 2016. |
Xinran Lu [lecture notes] |
The Sorcerer’s Apprentice
Guide to Fault Attacks H. Bar-El, H. Choukri, D. Naccache, M. Tunstall, C. Whelan. 2004. |
Greg Sanders [lecture notes] |
|
Mon Apr. 15 |
Design Principles for
Tamper-Resistant Smartcard Processors O. Kommerling, M. G. Kuhn. WOST 1999. |
Xinran Lu [lecture notes] |
Chip
and PIN is Broken S. J. Murdoch, S. Drimer, R. Anderson, M. Bond. SP 2010. |
Dylan Tastet [lecture notes] |
|
Mon Apr. 22 |
Final Presentations Please fill out the online Carolina Course Evaluation. |
|
Fri Apr. 26 |
Final Papers due @ 11:59 PM |