Information Security: Theory vs. Reality course (Winter 2015-2016)
- Lecturer: Eran Tromer
<>
- Teaching assistant: Tzvika Geft
<>
- Time: Tuesday 17:00-20:00,
- Place: Electrical Engineering Classrooms building, room 206
Instructions
Please fill the course questionnaire.
Mailing lists
Lectures
- Lecture 1: Introduction, Architectural side channels 1/2 [pdf] [pptx]
- Lecture 2: Architectural side channels 2/2 [pdf] [pptx]
- Lecture 3: Power analysis, correlation power analysis [pdf] [pptx]
- Lecture 4: Machine learning techniques in side-channel analysis [pdf]
- Lecture 5: Side channels: memory, taxonomy [pdf] [pptx]
- Lecture 6: Physical Side Channel Attacks on PCs [pdf] [pptx]
- Lecture 7: Fault attacks, Hardware security (1/2) [pdf] [pptx]
- Lecture 8: Hardware security (2/2),Leakage/tamper resilience (1/2) [pdf] [pptx]
- Lecture 9: Leakage/tamper resilience (2/2) [pdf] [pptx]
- Lecture 10: Trusted Platform Architecture and SGX [pdf] [pptx]
- Lecture 11: Fully-homomorphic encryption and Oblivious RAM [pdf] [pptx]
- Lecture 12: Verified computation [pdf] [pptx]
Exercises
- Exercise 1: (Micro)architectural attacks on a stream cipher [pdf] [data]
- Exercise 2: Power analysis, traffic analysis, fault [pdf] [data]
- Exercise 3: Leakage/tamper-resilience, fully homomorphic encryption [pdf]