In this workshop, we will explore how a hardware optimization—speculative execution—implemented in Apple Silicon CPUs introduces a side-channel vulnerability that can be exploited to exfiltrate secrets during the execution of cryptographic algorithms, ranging from classical encryption to post-quantum implementations. It is unclear whether the macOS operating system has a fix for this issue; at the time, it was believed that such a problem was unfixable since it is an inherent hardware characteristic. However, reverse engineering initiatives, such as Asahi Linux, have identified potential workarounds to mitigate the issue.
In the second part, we will introduce the Side-Channel Attack Lab, including hands-on activities targeting cryptographic algorithm implementations. We will explore reverse analysis and attack vectors against AES and asymmetric encryption. Following this, we will attempt to attack a Kryptus product and provide a demonstration of the product itself.
Workshop Format: In-person.
When? Thursday, September 19, 2024
Time? From 2:00 PM to 5:30 PM
Workshop Requirements:
- Knowledge of Python
- Personal notebook/laptop with Internet access and a Google account: we will be using Google Colab
- Not mandatory, but beneficial: knowledge of AES and asymmetric encryption
Hayato Fujii holds a Master’s degree in Computer Science from Unicamp, where he conducted research in cryptographic engineering, optimizing implementations of cryptographic algorithms (elliptic curves and block ciphers). He has collaborated with LG Electronics and Samsung R&D Brazil, with results embedded in the products of these companies. Currently, he serves as a Cryptography Specialist at Kryptus, operating the Side-Channel Attack Lab, developing cryptographic algorithms, and protecting them against attacks with the potential for secret extraction.