SCP Security Seminar

*********************************
There is now a CONTENT FREEZE for Mercury while we switch to a new platform. It began on Friday, March 10 at 6pm and will end on Wednesday, March 15 at noon. No new content can be created during this time, but all material in the system as of the beginning of the freeze will be migrated to the new platform, including users and groups. Functionally the new site is identical to the old one. webteam@gatech.edu
*********************************

Event Details
  • Date/Time:
    • Wednesday November 2, 2022
      12:00 pm - 1:00 pm
  • Location: Location: Vinings Conference Room (C1015), 10th Floor, Coda
  • Phone:
  • URL:
  • Email:
  • Fee(s):
    N/A
  • Extras:
Contact

Pradyumna Shome, Ph.D. Student

pradyumna.shome@gatech.edu

Summaries

Summary Sentence: Join us for a student led seminar series about today's security issues

Full Summary: No summary paragraph submitted.

Media
  • SCP Title Card SCP Title Card
    (image/jpeg)

Title: Axiomatic Hardware-Software Contracts for Security

Abstract: Microarchitectural attacks are side/covert channel attacks which enable leakage/communication as a direct result of hardware optimizations. Secure computation on modern hardware thus requires hardware-software contracts which include in their definition of software-visible state any microarchitectural state that can be exposed via microarchitectural attacks. Defining such contracts has become an active area of research. In this talk, we will present leakage containment models (LCMs)—novel axiomatic hardware-software contracts which support formally reasoning about the security guarantees of programs when they run on particular microarchitectures. Our first contribution is an axiomatic vocabulary for formally defining LCMs, derived from the established axiomatic vocabulary used to formalize processor memory consistency models. Using this vocabulary, we formalize microarchitectural leakage—focusing on leakage through hardware memory systems—so that it can be automatically detected in programs. To illustrate the efficacy of LCMs, we first demonstrate that our leakage definition faithfully captures a sampling of (transient and non-transient) microarchitectural attacks from the literature. Next, we develop a static analysis tool, called Clou, which automatically identifies microarchitectural vulnerabilities in programs given a specific LCM. We use Clou to search for Spectre gadgets in benchmark programs as well as real-world crypto-libraries (OpenSSL and Libsodium), finding new instances of leakage. To promote research on LCMs, we design the Subrosa toolkit for formally defining and automatically evaluating/comparing LCM specifications.

Biography: Nicholas Mosier is a 3rd-year PhD student at Stanford University advised by Caroline Trippel. His research focuses on developing Spectre detection and mitigation techniques that are scalable, efficient, and comprehensive. He is broadly interested in hardware and software security and enjoys bug hunting on the side.

Related Links

Additional Information

In Campus Calendar
Yes
Groups

College of Computing

Invited Audience
Faculty/Staff, Public, Undergraduate students
Categories
Seminar/Lecture/Colloquium
Keywords
student; seminar; talk; security; cybersecurity
Status
  • Created By: jpopham3
  • Workflow Status: Published
  • Created On: Oct 27, 2022 - 12:22pm
  • Last Updated: Oct 27, 2022 - 12:22pm