Ruhr-Uni-Bochum

"Processor Security - Fighting a Losing Battle" - Inaugural Lecture by Yuval Yarom

The Faculty of Computer Science cordially invites all interested parties to Prof Yuval Yarom’s inaugural lecture “Processor Security – Fighting a Losing Battle” on 18 January 2024 from 3 pm!

Yuval Yarom combines hardware and software security. Copyright: RUB, Katja Marquard

When? 18 January 2024, 3-4 p.m. Inaugural lecture, followed by a get-together with pizza and drinks

Where? Building MC, Open Space

Registration: https://terminplaner6.dfn.de/de/b/0ce45c9f0d126a7662f67482c7427839-528798

Since April 2023, Yuval Yarom has been Professor of Computer Security at the Faculty of Computer Science and Principal Investigator in the Cluster of Excellence CASA “Cyber Security in the Age of Large-Scale Adversaries”. His research lies at the interface between hardware and software security. ““The security of computer systems builds on basic properties of the processors, of the hardware. Without the hardware providing security capabilities, we do not have security at all.“ Making this hardware work in the first place means writing software. In IT security, there is specialized research for both areas, such as software security or embedded security, which relates to hardware. Yuval Yarom’s research combines both. For example, he focuses on solutions for cryptographic software that not only performs well independently, i.e. with the correct code but also takes into account the conditions of the hardware, i.e. in terms of implementation and efficiency.

The Faculty of Computer Science cordially invites all interested parties to Yuval Yarom’s inaugural lecture!

Abstract:

Over the past decades, the complexity of modern processors has increased exponentially. Mainstream, general-purpose processors have deviated from the Von Neumann model that they purport to support, creating a wide gap between the way programmers think about program execution and the actual execution model of the processor. In this talk we will discuss the security implications of this discrepancy, review examples of vulnerabilities and countermeasures, and consider future trends.

General note: In case of using gender-assigning attributes we include all those who consider themselves in this gender regardless of their own biological sex.