Skip to main content
To KTH's start page To KTH's start page

2018-09-03: A Constraint Programming approach to deliver a Tolerant Algebraic Side-Channel Attack of AES

Laurent Michel, Professor at the University of Connecticut (UConn), will give a seminar at 10:00 of the 3rd of September in room Ada, Floor 4 in Electrum, Kista. The title of the seminar is "A Constraint Programming approach to deliver a Tolerant Algebraic Side-Channel Attack of AES". Welcome!

Abstract

Tolerant Algebraic Side-Channel Attack (TASCA) is a combination of algebraic and side-channel analysis with error tolerance. Oren et al., used mathematical programming to implement TASCA on a limited version of AES. This talk will outline how one can adopt Constraint Programming to deliver an implementation of TASCA over the full AES with orders of magnitude improvements in solving time and memory usage over the mathematical programming approaches. The talk will provide the necessary background and focus on what makes CP such an ideal vehicle for this task. Empirical results will shed light on the performance to be expected and the full potential of CP for cryptanalysis in general.

About Laurent Michel

Laurent Michel received a B.S. and an Sc.M. in Computer Science from “Les Facultés Universitaires Notre-Dame de la Paix” (‘93) in Namur, Belgium. He later received an Sc.M. (‘96) and Ph.D. (‘99) degrees in Computer Science from Brown University.

After spending one year in industry and 2 years at Brown University as Visiting Assistant Professor, he joined the department in 2002 as Assistant Professor of Computer Science and Engineering and is now a Professor since 2017. His research interests focus on the design and implementation of domain specific languages for combinatorial optimization. In addition, he is Associate Department Head for CSE and is co-Director of CSI and C3, two Cybersecurity focused Centers.

Belongs to: School of Electrical Engineering and Computer Science
Last changed: Oct 23, 2019
Title
2021-12-08: Testing Software and Hardware against Speculation Contracts
2021-12 03: Practical Data Access Minimization in Trigger-Action Platforms
2021-11-16: Securing software in the presence of realistic attackers and polices
2021-11-9: An In-depth Study of Java Deserialization Exploits and Vulnerabilities
2019-02-05 Faceted Secure Multi-Execution
2019-01-11 Privacy-preserving ridesharing and multi key-homomorphic signatures
2018-11-06 Authentication and Pairing Using Human Body Impedance
2018-10-26 Security and Privacy in the IoT: An Information-Theoretic Perspective
2018-09-17 Cyber-Defence Panel
2018-09-13: Reconfigurable Distributed MIMO for Physical-layer Security in Mobile Networks
2018-09-03: A Constraint Programming approach to deliver a Tolerant Algebraic Side-Channel Attack of AES
2018-06-18: Coarse-grained information-flow control as a library in Haskell
2018-06-07: The capacity of private information retrieval with eavesdroppers
2018-05-23: Information-Flow Control for Concurrent Programs with Declassification
2018-05-09: Browser fingerprinting: past, present and possible future
2018-05-07: The Verificatum Project 10-year Anniversary