Skip to main content
To KTH's start page To KTH's start page

2021-11-16: Securing software in the presence of realistic attackers and polices

Amir M. Ahmadian (KTH) will give a seminar on November 16th, 2021, 14:00-15:00, Lindstedtsvägen 3, 5th floor, room 1537 or virtually.

Abstract:
Our world today heavily relies of software systems. They are used in almost every aspect of our society and thus securing them is a crucial and important task. Today, software is used in various settings such as a web or mobile, they are built from different components, and rely on interaction with other software like database systems or servers. This results in complex and heterogeneous software systems which are implemented and deployed under different assumptions about security policies and attacker capabilities. Therefore, while investigating the security of a program in a particular setting one should consider many different factors such as the relation between its building components, the setting specific threats, and relevant attacker models and security polices. In this seminar I will be presenting my research on security of software systems under
two particular settings. First I will talk about dynamic polices and the effects of changing the security policy during the execution of a program. I will discuss different attacker models and investigate their effects on our definition of security. In the second part of the presentation, I will discuss the security of programs that rely on trusted execution environments (TEE) for secure data storage and computation. The security guarantees of a TEE, relevant attacker capabilities, and their effect on the security of the programs developed for TEE will be the main discussion points of this part. Finally, I will also talk about the future direction of my research.

You are welcome to attend the seminar in person or virtually: kth-se.zoom.us/j/68555815435

Belongs to: School of Electrical Engineering and Computer Science
Last changed: Nov 11, 2021
Title
2021-12-08: Testing Software and Hardware against Speculation Contracts
2021-12 03: Practical Data Access Minimization in Trigger-Action Platforms
2021-11-16: Securing software in the presence of realistic attackers and polices
2021-11-9: An In-depth Study of Java Deserialization Exploits and Vulnerabilities
2019-02-05 Faceted Secure Multi-Execution
2019-01-11 Privacy-preserving ridesharing and multi key-homomorphic signatures
2018-11-06 Authentication and Pairing Using Human Body Impedance
2018-10-26 Security and Privacy in the IoT: An Information-Theoretic Perspective
2018-09-17 Cyber-Defence Panel
2018-09-13: Reconfigurable Distributed MIMO for Physical-layer Security in Mobile Networks
2018-09-03: A Constraint Programming approach to deliver a Tolerant Algebraic Side-Channel Attack of AES
2018-06-18: Coarse-grained information-flow control as a library in Haskell
2018-06-07: The capacity of private information retrieval with eavesdroppers
2018-05-23: Information-Flow Control for Concurrent Programs with Declassification
2018-05-09: Browser fingerprinting: past, present and possible future
2018-05-07: The Verificatum Project 10-year Anniversary