Wednesday, November 6
This tutorial session is jointly organized by Université Nice Côte d'Azur, Polytech'Nice Sophia engineering school and IFIP IoT 2024 conference.
This tutorial session will be held on Wednesday, November 6 from 14:00 to 16:00 in room XXX. This room is located close to the conference building.
The session is limited to 25 participants and registration is currently closed due to overcrowding.
Please review the hardware and software requirements for this tour at the bottom of this page.
Associate Professor Mike Borowczak, University of Central Florida
Title : Using Power to Unravel the Secrets Within: A Hands-on Exploration of Side Channel and Breaking Cryptographic Implementations
Abstract:
This two-hour workshop covers side channel basics, experiments with different types of power analysis to reveal internal secrets of hardware devices and provide you resources to continue exploration.
We'll look at traditional uses of Side Channel Attacks to exfiltrate keys and present some advanced uses such as the extraction of other hidden features (e.g., ML models, FSM states, etc.).
To engage in the full experience bring a laptop with VirtualBox installed to engage in this hands-on experience with side channels using the Chipwhisper platform, from power trace collection to analysis from basic theory to practice.
This session is based on materials with an open-source GPL license along with additional materials based on current research.
Bio:
Dr. Mike Borowczak is an Associate Professor of Electrical and Computer Engineering at the University of Central Florida where he serves as the founding director of the DRACO Lab (thedracolab.com).
He is the former Templeton Associate Professor of EECS and Loy and Edith Harris Assistant Professor of Computer Science at the University of Wyoming.
He is a former hardware security architect and data scientist, having worked in the semiconductor industry as well as several since-acquired startups.
Since returning fulltime to academia in 2018, his research interests surround the security and resilience of sensitive and/or distributed systems to the integration of security and computing into all levels of education.
Has published, often with his students and interdisciplinary collaborators, over 80 peer reviewed book/journal/conference.
He currently serves as editor/co-editor/associate editor of several journals while contributing to many conference organizing technical program committees.
His research has been funded (>$8.5M since 2018) by federal, national, state, and industrial entities, including the NSF, NSA, DoE/Idaho National Laboratory, State of Wyoming, IOHK, Kraken, Ripple, among others.
Mike Borowczak [HomePage]
Hardware and software requirements
Any laptop with AMD or Intel processor is recommend.
Due to some issues with Apple computers equipped with M* processors (both virtualization and hardware compatibility issues), these are not recommended (the issues are not impossible to overcome, but not within the 2-hour timeframe of this tutorial).
For the software we are using there are two paths:
- [Universal] AnyOS: VirtualBox
- [Easier] Windows Only w/Admin Access: chipwhisperer (Chipwhisperer.v5.7.0.Setup.64-bit.exe)