Detecting Software Side Channel Vulnerabilities

Speaker: Dr. Shuai WANG
         Assistant Professor
         Department of Computer Science and Engineering
         Hong Kong University of Science and Technology

Title:  "Detecting Software Side Channel Vulnerabilities"

Date:   Monday, 14 Nov 2022

Time:   4:00pm - 5:00pm

Venue:  Lecture Theater F
        Leung Yat Sing Lecture Theater, near lift 25/26
        HKUST


Abstract:

Side-channel attacks recover secret information by analyzing the physical
implementation of cryptosystems based on non-functional computational
characteristics, e.g. time, power, and acoustic. Among all well-known side
channels, cache-based side channels are notoriously severe, leading to
practical attacks against certain implementations of theoretically secure
crypto algorithms, such as RSA, ElGamal and AES. In this talk, Shuai Wang
will give a general introduction about side channel attacks. He will then
discuss recent progresses in helping software developers identify
vulnerabilities that can lead to side channel attacks under various
scenarios, including conventional cryptographic systems and modern
cloud-based AI systems.


******************
Biography:

Dr. Shuai Wang is an Assistant Professor at the Department of Computer
Science and Engineering (CSE), Hong Kong University of Science and
Technology (HKUST). He received his Ph.D. from Penn State University, and
B.S. from Peking University. Before joining HKUST, He was a post-doctoral
researcher at ETH Zurich. He is broadly interested in computer security
and software engineering. His recent research covers topics like side
channel analysis, reverse engineering, supply chain security, AI security,
smart contract security, and privacy-enhancing techniques.