Standard

group_project

Visible to the public TWC: Medium: Collaborative: The Theory and Practice of Key Derivation

Most cryptographic applications crucially rely on secret keys that are chosen randomly and are unknown to an attacker. Unfortunately, the process of deriving secret keys in practice is often difficult, error-prone and riddled with security vulnerabilities. Badly generated keys offer a prevalent source of attacks that render complex cryptographic applications completely insecure, despite their sophisticated design and rigorous mathematical analysis.

group_project

Visible to the public FOundations of Secure and TrustEd HardwaRe (FOSTER) Workshop

Semiconductor microchips are the brains inside all of the electronic devices that pervade our society. To control costs, microchips are often designed and even manufactured off-shore. Outsourcing the design and fabrication of semiconductor microchips comes at the expense of their security. For one, an off-shore microchip foundry can copy or steal the chip's blueprint, and sell copies of the chip in the black market. Perhaps worse, the foundry can also modify the chip's blueprint in stealthy ways, such that modifications go undetected and the chip misbehaves in harmful ways.

group_project

Visible to the public TWC: Phase: Medium: Collaborative Proposal: Understanding and Exploiting Parallelism in Deep Packet Inspection on Concurrent Architectures

Deep packet inspection (DPI) is a crucial tool for protecting networks from emerging and sophisticated attacks. However, it is becoming increasingly difficult to implement DPI effectively due to the rising need for more complex analysis, combined with the relentless growth in the volume of network traffic that these systems must inspect. To address this challenge, future DPI technologies must exploit the power of emerging highly concurrent multi- and many-core platforms.