Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Leakage Models: A Leaky Abstraction in Cryptographic Software Verification

ACM SIGPLAN via YouTube

Overview

Coursera Plus Monthly Sale: All Certificates & Courses 40% Off!
Explore a groundbreaking proposal to revolutionize the verification of timing properties in cryptographic software during this 12-minute conference talk from ACM SIGPLAN. Delve into the innovative approach presented by researchers from MIT and NYU, who suggest abandoning traditional leakage models in favor of direct verification against hardware implementations at the gate level. Discover the results of their early experiments, which successfully verified constant-time execution of Ed25519 signature computations on a 7-stage pipelined processor. Gain insights into the significant open challenges that lie ahead, including scaling up the tool for modern out-of-order speculative cores and extending the methodology to analyze library code beyond whole application contexts.

Syllabus

[PLARCH23] Leakage models are a leaky abstraction (...)

Taught by

ACM SIGPLAN

Reviews

Start your review of Leakage Models: A Leaky Abstraction in Cryptographic Software Verification

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.