ENSAE Paris - École d'ingénieurs pour l'économie, la data science, la finance et l'actuariat

International Winter School on Microarchitectural Security 2022

The International Winter School on Microarchitectural Security (Mic-Sec) offers academic and industrial talks along with hands-on experience on attacks, software and hardware countermeasure techniques with a special focus on side-channel attacks. The Mic-Sec Winter School 2022 edition will take place at the FIAP Paris from the 5th to the 9th of December 2022 in Paris, France.

Today, computing systems are going through the trough of disillusionment related to the prevailing security. The revelations of security and privacy vulnerabilities in microprocessors, both at software and hardware levels, have been appalling. These microarchitectural vulnerabilities affect almost all processors, across virtually all operating systems and architectures. One of the biggest problems in modern computing infrastructure today is that security is not regarded as a system-wide issue and, therefore, preventive measures are vulnerability-specific, limited in scope, and might even create new vulnerabilities. The primary reason behind this is the fact that almost every aspect in modern computing architectures can be subject to the discovery of new attack vector: from computational optimizations to storage elements and interfaces, from end-user applications to the operating system & hypervisors, and from the microarchitecture to the underlying hardware. This trend is getting further momentum, and worse, the complete attack surface is not yet known. The hardware is often considered as an abstract layer that delivers some computational infrastructure and is assumed to be correct. But it might leak critical information as a side effect of software implementation and execution.

Side-channel Attacks (SCAs) and defenses on the microarchitectural level, therefore, have become an important field of research. Side-channel attacks exploit existing vulnerabilities in order to extract privileged information at both physical and computational and storage levels. In order to enhance the resistance of cryptographic and security critical implementations within the design phase, countermeasures and analysis techniques are mandatory.

The MIC-SEC winter school offers academic and industrial talks along with hands-on experience on attacks, software and hardware countermeasure techniques with a special focus on side-channel attacks. The school will offer a round table discussion with industrial and academic partners to foresee the future of computing in security. The scope of the MIC-SEC winter school is as follows:

  • Side-Channel attacks and defenses 
  • Role of Machine Learning in microarchitectural security
  • Microarchitectural security at the interfaces of hardware and software, in particular industrial perspectives

MIC-SEC offers an opportunity to young researchers such as PhD students and research engineers from academia and industry with lectures and hands-on experiences to get to know the domain of microarchitectural security. It will allow the participants to practise theoretical principles in reality. Attending students are strongly advised to actively take part in the poster session held at the MIC-SEC winter school. Furthermore, there will be an opportunity for senior PhD students and research engineers to do a short presentation of their research work.

During the MIC-SEC winter school, one afternoon will be reserved for a poster session. All participants are invited to prepare a poster in A0 format, presenting their current research. Students are advised to bring their printed posters to display in the Poster Hall. Candidates who are willing to bring a poster should mention it in their registration.

There will also be some time for student’s presentations. Please understand that we will not have enough time to allow everybody to step on the stage. In order to maximize the number of presentations (without having to stay awake until midnight), senior PhD students are invited to submit a short presentation, showcasing their PhD in 180 seconds. In case of many submissions, there will be a selection of the best presentations. If you are interested to participate in this experience, please contact us by mail.

 

Day 1

 

Day 2

 

Day3

 

Day 4

 

Day 5

10-12 PM

Registrations+Breakfast+Orientation Presentation

8:30-10 AM

Talk 1

8:30-10AM

Talk 5

8:30-10AM

Talk 8

8:30-10AM

Talk 11

12-02 PM

Lunch

10-10:30AM

Coffee Break

10-10:30AM

Coffee Break

10-10:30 AM

Coffee Break

10-10:30AM

Coffee Break

02-4 PM

Student Presentations

10:30-12 PM

Talk 2

10:30-12PM

Talk 6

10:30-12 PM

Talk 9

10:30-12PM

Talk 12

4-4:30 PM

Coffee Break

12-2 PM

Lunch

12-2 PM

Lunch

12-2 PM

Lunch

12-2 PM

Lunch

4:30-5:30

Student Presentations

2-3:30 PM

Talk 3

2-4 PM

Poster Session 

 

2-4 PM

Talk 10

Good Bye

5:30-7PM

 

Cocktail

 

3:30-4PM

Coffee Break

4-4:30

Coffee Break

4-4:30 PM

Coffee Break

4-5:30 PM

Talk 4

4:30-6 PM

Talk 7

7-9 PM

Gala Dinner

Registration cost:

  • Students (Masters, PhD, Postdoc): 500€
  • Others (Research Engineers, Industrials, Faculty): 600€


Registration Deadline: 30th September 2022



Registration fee covers 5 days school sessions, coffee breaks, lunches, social events, and the social dinner.


Participants are requested to submit the Application form.


Registered participants have to send the completed form, copy of ID and proof of payment (info coming soon) by email.

The Mic-Sec Winter School 2022 will take place at the FIAP Paris from the 5th to the 9th of December 2022 in Paris, France.

FIAP has accomodation service available on "first come, first serve" basis. It allows students to reserve rooms on sharing also. More information here.
 

IMPORTANT: Health advisory

The format of the School will be presential, so we are expecting to meet you in real life!

All attendees must observe the health advisory of France if travelling from abroad or within France i.e. vaccination, rapid tests, PCR tests etc. Here you can find the health regulations that apply.

Our primary goal is the safety of all organizers, speakers, candidates and staff working at the FIAP. For this reason, we will be prepared to ensure that the School takes place in the best conditions, following the instructions of the authorities.

1) Proof of vaccination
2) Venue hygiene
3) Physical distance and accesses
4) Personal shielding
5) Adapted services
6) F&B (Food and Beverage)

FIAP has drawn up an extensive protocol with all the sanitary procedures, available here (FR). This protocol is constantly updated.

Please keep monitoring this health advisory page regularly to be updated in case of evolution of situation.

We are looking forward to seeing you in Paris!

This content will be available once the speakers deliver their presentations.

This content will be available after the Winter School. Come with your best smile!

Organizers

Maria Mushtaq, Associate Professor, Telecom Paris, France 

Maria MUSHTAQ is an Associate Professor at Telecom Paris in Safe and Secure Hardware group (SSH) of COMELEC Department. She received her PhD in Information Security from the University of South Brittany (UBS), France, in 2019. She has worked as a CNRS Postdoctoral Researcher at LIRMM, University of Montpellier (UM), France. She possesses expertise in microarchitectural vulnerability assessment and design & development of runtime mitigation solutions against side- and covert-channel information leakage in modern computing systems. Her research interests mainly focus on cryptanalysis, constructing and validating software security components, and constructing OS-based security primitives against various hardware vulnerabilities.

 

Ulrich Kühne, Associate Professor, Telecom Paris, France

He is an Associate Professor in the physical security of embedded systems in the Communications and Electronics Department at Télécom Paris. His doctoral thesis, which he obtained from Bremen University in Germany in 2009, was on the formal verification of embedded processors. He then spent two years as a postdoctoral researcher at the ENS Cachan LSV before joining the Digital Electronic Systems (SEN) Department at Télécom Paris in 2016. His areas of research are physical security, formal methods and hybrid systems.

 

 

Collaborators

Karine Heydemann, Associate Professor, LIP6, Sorbonne University, France 

Quentin L. Meunier, Associate Professor, LIP6, Sorbonne University, France 

Description

Today, computing systems are going through the trough of disillusionment related to the prevailing security. The revelations of security and privacy vulnerabilities in microprocessors, both at software and hardware levels, have been appalling. These microarchitectural vulnerabilities affect almost all processors, across virtually all operating systems and architectures. One of the biggest problems in modern computing infrastructure today is that security is not regarded as a system-wide issue and, therefore, preventive measures are vulnerability-specific, limited in scope, and might even create new vulnerabilities. The primary reason behind this is the fact that almost every aspect in modern computing architectures can be subject to the discovery of new attack vector: from computational optimizations to storage elements and interfaces, from end-user applications to the operating system & hypervisors, and from the microarchitecture to the underlying hardware. This trend is getting further momentum, and worse, the complete attack surface is not yet known. The hardware is often considered as an abstract layer that delivers some computational infrastructure and is assumed to be correct. But it might leak critical information as a side effect of software implementation and execution.

Side-channel Attacks (SCAs) and defenses on the microarchitectural level, therefore, have become an important field of research. Side-channel attacks exploit existing vulnerabilities in order to extract privileged information at both physical and computational and storage levels. In order to enhance the resistance of cryptographic and security critical implementations within the design phase, countermeasures and analysis techniques are mandatory.

The MIC-SEC winter school offers academic and industrial talks along with hands-on experience on attacks, software and hardware countermeasure techniques with a special focus on side-channel attacks. The school will offer a round table discussion with industrial and academic partners to foresee the future of computing in security. The scope of the MIC-SEC winter school is as follows:

  • Side-Channel attacks and defenses 
  • Role of Machine Learning in microarchitectural security
  • Microarchitectural security at the interfaces of hardware and software, in particular industrial perspectives

MIC-SEC offers an opportunity to young researchers such as PhD students and research engineers from academia and industry with lectures and hands-on experiences to get to know the domain of microarchitectural security. It will allow the participants to practise theoretical principles in reality. Attending students are strongly advised to actively take part in the poster session held at the MIC-SEC winter school. Furthermore, there will be an opportunity for senior PhD students and research engineers to do a short presentation of their research work.

During the MIC-SEC winter school, one afternoon will be reserved for a poster session. All participants are invited to prepare a poster in A0 format, presenting their current research. Students are advised to bring their printed posters to display in the Poster Hall. Candidates who are willing to bring a poster should mention it in their registration.

There will also be some time for student’s presentations. Please understand that we will not have enough time to allow everybody to step on the stage. In order to maximize the number of presentations (without having to stay awake until midnight), senior PhD students are invited to submit a short presentation, showcasing their PhD in 180 seconds. In case of many submissions, there will be a selection of the best presentations. If you are interested to participate in this experience, please contact us by mail.

 

Day 1

 

Day 2

 

Day3

 

Day 4

 

Day 5

10-12 PM

Registrations+Breakfast+Orientation Presentation

8:30-10 AM

Talk 1

8:30-10AM

Talk 5

8:30-10AM

Talk 8

8:30-10AM

Talk 11

12-02 PM

Lunch

10-10:30AM

Coffee Break

10-10:30AM

Coffee Break

10-10:30 AM

Coffee Break

10-10:30AM

Coffee Break

02-4 PM

Student Presentations

10:30-12 PM

Talk 2

10:30-12PM

Talk 6

10:30-12 PM

Talk 9

10:30-12PM

Talk 12

4-4:30 PM

Coffee Break

12-2 PM

Lunch

12-2 PM

Lunch

12-2 PM

Lunch

12-2 PM

Lunch

4:30-5:30

Student Presentations

2-3:30 PM

Talk 3

2-4 PM

Poster Session 

 

2-4 PM

Talk 10

Good Bye

5:30-7PM

 

Cocktail

 

3:30-4PM

Coffee Break

4-4:30

Coffee Break

4-4:30 PM

Coffee Break

4-5:30 PM

Talk 4

4:30-6 PM

Talk 7

7-9 PM

Gala Dinner

Registration cost:

  • Students (Masters, PhD, Postdoc): 500€
  • Others (Research Engineers, Industrials, Faculty): 600€


Registration Deadline: 30th September 2022



Registration fee covers 5 days school sessions, coffee breaks, lunches, social events, and the social dinner.


Participants are requested to submit the Application form.


Registered participants have to send the completed form, copy of ID and proof of payment (info coming soon) by email.

The Mic-Sec Winter School 2022 will take place at the FIAP Paris from the 5th to the 9th of December 2022 in Paris, France.

FIAP has accomodation service available on "first come, first serve" basis. It allows students to reserve rooms on sharing also. More information here.
 

IMPORTANT: Health advisory

The format of the School will be presential, so we are expecting to meet you in real life!

All attendees must observe the health advisory of France if travelling from abroad or within France i.e. vaccination, rapid tests, PCR tests etc. Here you can find the health regulations that apply.

Our primary goal is the safety of all organizers, speakers, candidates and staff working at the FIAP. For this reason, we will be prepared to ensure that the School takes place in the best conditions, following the instructions of the authorities.

1) Proof of vaccination
2) Venue hygiene
3) Physical distance and accesses
4) Personal shielding
5) Adapted services
6) F&B (Food and Beverage)

FIAP has drawn up an extensive protocol with all the sanitary procedures, available here (FR). This protocol is constantly updated.

Please keep monitoring this health advisory page regularly to be updated in case of evolution of situation.

We are looking forward to seeing you in Paris!

This content will be available once the speakers deliver their presentations.

This content will be available after the Winter School. Come with your best smile!

Organizers

Maria Mushtaq, Associate Professor, Telecom Paris, France 

Maria MUSHTAQ is an Associate Professor at Telecom Paris in Safe and Secure Hardware group (SSH) of COMELEC Department. She received her PhD in Information Security from the University of South Brittany (UBS), France, in 2019. She has worked as a CNRS Postdoctoral Researcher at LIRMM, University of Montpellier (UM), France. She possesses expertise in microarchitectural vulnerability assessment and design & development of runtime mitigation solutions against side- and covert-channel information leakage in modern computing systems. Her research interests mainly focus on cryptanalysis, constructing and validating software security components, and constructing OS-based security primitives against various hardware vulnerabilities.

 

Ulrich Kühne, Associate Professor, Telecom Paris, France

He is an Associate Professor in the physical security of embedded systems in the Communications and Electronics Department at Télécom Paris. His doctoral thesis, which he obtained from Bremen University in Germany in 2009, was on the formal verification of embedded processors. He then spent two years as a postdoctoral researcher at the ENS Cachan LSV before joining the Digital Electronic Systems (SEN) Department at Télécom Paris in 2016. His areas of research are physical security, formal methods and hybrid systems.

 

 

Collaborators

Karine Heydemann, Associate Professor, LIP6, Sorbonne University, France 

Quentin L. Meunier, Associate Professor, LIP6, Sorbonne University, France