Microarchitectural attacks and provable defenses.
le 24 septembre 2025
13h15Campus de Beaulieu Campus de Beaulieu Amphi P - bât. 12D
Intervention de Lesly-Ann Daniel, maîtresse de conférences à EURECOM,dans le cadre des séminaires du département Informatique.
Abstract
Modern processors rely on microarchitectural optimizations, such as caches and speculative execution, for performance, but these same features open the door to powerful attacks on cryptographic systems. The standard defense, constant- time programming, is widely used in cryptographic libraries, yet it falls short against threats like Spectre. In this talk, I will show how to enforce constant-time in software, how to extend it to defend against Spectre, and how hardware support can strengthen protection against microarchitectural attacks.
Les supports présentés sont disponibles à l'adresse suivante: https://leslyann-daniel.fr/ressources/slides/2025-09_ENS.pdf
Modern processors rely on microarchitectural optimizations, such as caches and speculative execution, for performance, but these same features open the door to powerful attacks on cryptographic systems. The standard defense, constant- time programming, is widely used in cryptographic libraries, yet it falls short against threats like Spectre. In this talk, I will show how to enforce constant-time in software, how to extend it to defend against Spectre, and how hardware support can strengthen protection against microarchitectural attacks.
Les supports présentés sont disponibles à l'adresse suivante: https://leslyann-daniel.fr/ressources/slides/2025-09_ENS.pdf
- Thématique(s)
- Formation, Recherche - Valorisation
- Contact
- Martin Quinson
Mise à jour le 26 septembre 2025