Partager cette page :

Microarchitectural attacks and provable defenses.

le 24 septembre 2025

13h15

Campus de Beaulieu Campus de Beaulieu Amphi P - bât. 12D

Intervention de Lesly-Ann Daniel, maîtresse de conférences à EURECOM,dans le cadre des séminaires du département Informatique.

/medias/photo/seminaire-di_1630676501273-jpg

Abstract
Modern processors rely on microarchitectural optimizations, such as caches and speculative execution, for performance, but these same features open the door to powerful attacks on cryptographic systems. The standard defense, constant- time programming, is widely used in cryptographic libraries, yet it falls short against threats like Spectre. In this talk, I will show how to enforce constant-time in software, how to extend it to defend against Spectre, and how hardware support can strengthen protection against microarchitectural attacks.

Les supports présentés sont disponibles à l'adresse suivante: https://leslyann-daniel.fr/ressources/slides/2025-09_ENS.pdf
Thématique(s)
Formation, Recherche - Valorisation
Contact
Martin Quinson

Mise à jour le 26 septembre 2025