|
Seminar 2015-08-19:Tom Allan;
Mobile code cache-based side-channel attacks
|
Side-channel attacks have been shown to leak cryptographic
keys. However, for the attack, the adversary needs access
to the physical machine the victim executes on. So, the
question is how does the adversary gets her code to the
victim machine. Web-based mobile code provides an easy
vector for getting code to the target machine, however
there are several hurdles for implementing such attacks
from mobile code.
The first hurdle is that the attack code executes within a
virtual address space which hides the mapping of the cache.
Past research relies on huge pages to recover this mapping,
however huge pages are not available to mobile code. We
describe a cache profiling technique that allows us to
profile the cache without the use of huge pages.
Another hurdle is that cache-based attacks rely on a
high-resolution timer. As a precaution against cache-based
attacks, browsers are now moving towards disabling
high-resolution timers. We demonstrate that we can create a
high-resolution timer by using multiple threads. Lastly,
prior cache-based attacks focused on statically-compiled
languages. With the move to the Web, many programs are now
written in dynamic languages. Consequently the memory
layout of the program is unknown to the adversary. We show
that implementations in dynamic languages are still
vulnerable.
We implement the attack code in both Javascript and as
Google Chrome's Native Client. We use the attack against
the Javascript ElGamal encryption as implemented in
Openpgp.js and show that using the side channel information
we can reduce the search space to 2^30 keys.
|
|
Seminar 2015-08-18:
Harry Butterworth on Paxos In Production
|
|
The core of IBM's Spectrum Virtualize(TM) software is a
Paxos-based, fault-tolerant cluster operating environment
which has been in production use since 2003. In the context
of multinational enterprise IT infrastructure, I will first
introduce some current storage products powered by IBM
Spectrum Virtualize(TM) software, then I will review
fault-tolerance and the Paxos protocol and finally I will
describe a programming model, protocol extensions,
supporting features and optimizations used in this
deployment of Paxos in production.
|
|
2015-08-17 Best Scientific Cybersecurity Paper Award Winner
|
|
Congratulations to TS's Prof Carroll Morgan and
co-authors, who have won the Annual NSA
Best Scientific Cybersecurity Paper Award for their
paper
Additive and Multiplicative Notions of Leakage and Their
Capacities published at last year's IEEE Computer
Security Foundations Symposium.
|
|
Seminar 2015-08-17: Jan Auer; Enhancing Static Analysis
with Runtime Verification
|
|
Static program analysis and runtime verification are two
complementary, yet supplemental approaches to ensuring
correct program execution. Theformer is well established
and integrated in many development environments, as well as
several enterprise-grade standalone tools. Runtime
verification, on the other hand, facilitates targeted
monitoring of production systems without the risk of false
positives or false negatives. In this presentation we
preset "Static Runtime Verification", a formalbridge
between static analysis and runtime verification that
leverages synergy effects between both approaches. Analysis
comprises three stages: Identification of error candidates
using static analysis, event instrumentation at these
locations, and final runtime monitoring. Moreover, we
introduce our prototype platform StaticRV and a number of
use cases
|
|
Seminar 2015-07-06: Prof. Cesare Pautasso;
Let's have a RESTful Conversation
|
|
The REST architectural style has made a strong impact on
the way Web services are designed, built and also composed.
In this talk we take a close look at the way clients
interact with them and introduce the notion of RESTful
conversation. We show that there many examples of recurring
conversation types that can be found on the Web (from small
indirect lookups based on hypermedia relationships, to the
navigation within the elements of collection resources or
the confirmation/cancellation of reserved resources within
RESTful atomic distributed transactions). Capturing them
helps to raise the abstraction level when modeling RESTful
APIs and also provides a novel perspective to study the
relationship between business processes and Web resources,
or what we call RESTful Business Process Management.
|