[Colloquium] Reminder - Troy Hu MS Presentation/May 29, 2020
Jessica Garza
jdgarza at cs.uchicago.edu
Wed May 27 12:51:27 CDT 2020
This is an announcement of Troy Hu's MS Presentation. Troy is a student in the Bx/MS program.
Here is the Zoom link to participate:
https://uchicagostudents.zoom.us/j/97220161180 <https://uchicagostudents.zoom.us/j/97220161180>
Meeting ID: 972 2016 1180
One tap mobile
+13126266799,,97220161180# US (Chicago)
+13017158592,,97220161180# US (Germantown)
Dial by your location
+1 312 626 6799 US (Chicago)
+1 301 715 8592 US (Germantown)
+1 929 436 2866 US (New York)
+1 669 900 6833 US (San Jose)
+1 253 215 8782 US (Tacoma)
+1 346 248 7799 US (Houston)
Meeting ID: 972 2016 1180
Find your local number: https://uchicagostudents.zoom.us/u/adbl4QGz6c <https://uchicagostudents.zoom.us/u/adbl4QGz6c>
------------------------------------------------------------------------------
Date: Friday, May 29, 2020
Time: 10:00 AM, Central Time
Place: remote via Zoom
M.S. Candidate: Troy Hu
M.S. Paper Title: Automated Localization of Timing-Related Security Bugs in Hardware Designs
Abstract:
Hardware systems today are largely at risk of leaking sensitive data through timing variations in low-level operations, which leads to severe consequences such as confidentiality breaches and malicious actors gaining root privileges. For example, the famous Spectre and Meltdown attacks on modern processors are possible partly due to timing variations in the caches. In order to ensure timing secure designs, hardware designers must be provided with the necessary tools to detect and localize the bugs. While there exist techniques that can detect timing-related security bugs, e.g. Information Flow Tracking (IFT), bug localization is primarily performed through manual efforts, which are time-consuming and inefficient. In this talk, we present a novel and elegant technique that can be utilized to automatically localize timing-related security bugs in hardware designs by leveraging existing IFT infrastructure with low cost and high precision. We demonstrate the efficacy of this technique by applying it to a wide variety of hardware designs. Moreover, based on the insights gained from our results, we identify exciting directions for future work in security bug localization.
Troy's Advisor: Professor Yanjing Li
Jessica Garza
Assistant Director of Undergraduate Studies
Department of Computer Science
The University of Chicago
Covid-19 Resources <https://cs.uchicago.edu/remote2020/>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.cs.uchicago.edu/pipermail/colloquium/attachments/20200527/6e5473ff/attachment-0002.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: Troy Hu - Draft MS Paper.pdf
Type: application/pdf
Size: 2104130 bytes
Desc: not available
URL: <http://mailman.cs.uchicago.edu/pipermail/colloquium/attachments/20200527/6e5473ff/attachment-0001.pdf>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.cs.uchicago.edu/pipermail/colloquium/attachments/20200527/6e5473ff/attachment-0003.html>
More information about the Colloquium
mailing list