Please note: the training ticket does not include access to the conference. Similarly, the conference ticket does not grant access to the trainings. If you have any questions, reach out to us.
Modern cryptography has produced a multitude of ciphers that protect our daily lives including secure authentication, electronic transactions etc.
However, once the cipher is implemented on a physical device (microprocessor, FPGA, ASIC etc.) it becomes vulnerable to physical attacks such as side-channel analysis and fault injection.
With side-channel attacks the attackers monitor closely the power consumption or electromagnetic emission of a cryptographic device and they are able to extract the secret key using statistical techniques.
In this training we will provide extensive overview of side-channel analysis (SCA) of crypto implementations, showcasing the core techniques for key recovery. During the training the students will get the chance to develop several basic side-channel analysis tools in Python. They will also learn to perform hands-on physical attacks on real hardware. Subsequently they will use the tools to perform attacks on real-world datasets aiming at the secret key extraction.
We will also discuss the ways Machine learning and AI changed the side-channel analysis landscape and attackers’ capabilities in particular. First, we learn how AI can improve side-channel attacks and leakage exploitation in general. Second, we demonstrate the way side-channel analysis threatens implementations of AI on embedded devices and other platforms like GPUs, FPGAs etc. Finally, we discuss recent trends and other impacts of AI on hardware security.
The training will cover passive side-channel attacks on crypto implementations and countermeasures, including template attacks and leakage evaluation techniques. The training participants will learn to prepare the attacks including the attack set-up and execution on real hardware.
Each training module will start with a tutorial identifying the main concepts and the theory behind physical attacks. After that, several assignments will be given to master the content and learn about key insights and identify practical challenges.
A detailed description of the course structure and content, including an outline (day-wise agenda) of theory and practical exercises. Hands-on & interactive approaches are strongly encouraged.
Side-channel attacks on crypto implementations and countermeasures:
Assignments 1-2: Hands-on DPA attacks on software and hardware implementations
Profiling attacks:
Assignment 3: Template attack on an ECC implementation on ARM Cortex micro-controller
Higher order attacks:
Assignment 4: 2nd order attacks on a DPA-protected implementation
Leakage evaluation:
Assignment 5: TVLA evaluation of (un)protected implementations
AI-assisted SCA
Side-channel analysis of AI implementations
Assignment 6: Deep learning SCA attacks on ECC implementations
Assignment 7: CUDA implementations of SCA
Own laptop running Windows / Linux / macOS
Installed Python version 3
Extra pen drive
Lejla Batina is a full professor at Radboud University. She got her professional doctorate in engineering from Eindhoven University of Technology and her PhD in Cryptography from KU Leuven, Belgium (2005). Prior to joining Radboud University she spent 3 years in industry as a cryptographer at Pijnenburg Securealink (later SafeNet B.V.) in The Netherlands. Her research interests include cryptographic implementations and physical attacks and countermeasures. She has coauthored more than 160 refereed articles on topics from secure cryptographic implementations and embedded systems security. Her current research interests are in intersection of AI and hardware security. She leads a group of 10+ researchers at Radboud University and 12 PhD students have so far graduated under her supervision.
Łukasz Chmielewski holds the position of Assistant Professor at Masaryk University in Brno, Czech Republic. His primary area of expertise revolves around side-channel analysis (SCA) of public-key cryptosystems. In general, he is also interested in hardware attacks, including fault injection, on real-world devices. Currently, he is actively involved in enhancing the capabilities of the side-channel CRoCS lab. Moreover, in recent years, he has worked on the applications of deep learning to SCA, targeting both symmetric and asymmetric schemes. In the past, he obtained his PhD and was a postdoctoral researcher in the Digital Security Group at Radboud University Nijmegen. He also has significant commercial experience in SCA, FI, and software-security evaluations of embedded devices. His overall practical experience in physical attacks spans the last 12 years.
Peter Horvath has a Master's in Computer Science with a focus on Artificial Intelligence and Cybersecurity. He is currently a PhD candidate at Radboud University advised by Prof. Lejla Batina. His research interests include reverse engineering neural network implementations on GPU and estimating side-channel leakage of crypto algorithms pre-silicon.