Reading Topics |
Introduction to cybersecurity: Cyber attacks examples
- M. Lipp et al. "Meltdown"
- P. Kocher et al. "Spectre Attacks: Exploiting Speculative Execution"
|
Application level attacks: Code injection, Buffer Overflow, Control-Flow Hijacking
- Y. Younan, W. Joosen, and F. Piessens "Runtime countermeasures for code injection attacks against C and C++ programs"
- V. Kiriansky and C. Waldspurger "Speculative Buffer Overflows: Attacks and Defenses"
|
Classic and Modern encryption algorithms: AES, RSA, Hash, MAC, digital signatures, etc.
- J. Katz and Y. Lindell "Introduction to modern cryptography" Chapters 4 and 5
- J. Katz and Y. Lindell "Introduction to modern cryptography" Chapters 10 and 12
|
Hardware security primitives: Physical unclonable functions, oblivious RAM, circuit obfuscation
- C. Herder, M. Yu, F. Koushanfar, and Srinivas Devadas, Physical Unclonable Functions and Applications: A Tutorial"
- M. Rostami, F. Koushanfar, and R. Karri "A Primer on Hardware Security: Models, Methods, and Metrics"
|
Introduction to cybersecurity: Cyber attacks examples
- M. Lipp et al. "Meltdown"
- P. Kocher et al. "Spectre Attacks: Exploiting Speculative Execution"
|
Introduction to cybersecurity: Cyber attacks examples
- M. Lipp et al. "Meltdown"
- P. Kocher et al. "Spectre Attacks: Exploiting Speculative Execution"
|
Distributed trustworthy systems: Distributed key management, authentication, confidentiality
- Marten van Dijk and Ari Juels "On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing"
|
Secure computing: Secure multiparty computation, homomorphic computation
- Craig Gentry "Computing Arbitrary Functions of Encrypted Data"
- C. Moore et al. "Practical Homomorphic Encryption: A Survey"
- Maha Tebaa and Said El Hajii "Secure Cloud Computing through Homomorphic Encryption"
- Ueli Maurer "Secure multi-party computation made simple"
|
Secure Architecture Design Concepts: Isolation, obfuscation, attestation
- Chao Zhang et al. "Practical Control Flow Integrity and Randomization for Binary Executables"
|
Memory integrity, cache side channel, secure boot, trusted OS
- R. Elbaz et al. "Hardware mechanisms for memory authentication: A survey of existing techniques and engines"
- P. Subramanyan et al. "A Formal Foundation for Secure Remote Execution of Enclaves"
- S. Gueron "A Memory Encryption Engine Suitable for General Purpose Processors"
|