Seminar talks by Adi Shamir (2015)

From CryptoLUX
Revision as of 09:40, 9 June 2015 by Leo.perrin (talk | contribs) (Created page with "It is our pleasure to host two talks by [http://www.wisdom.weizmann.ac.il/profile/scientists/shamir-profile.html Adi Shamir]. === How to Reach Unreachable Computers === '''W...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

It is our pleasure to host two talks by Adi Shamir.

How to Reach Unreachable Computers

Wednesday 10/06, 10:00-11:00, C02, Kirchberg campus (FSTC/Uni.lu)

Abstract: Highly sensitive computers are usually unreachable in the sense that they are located in isolated facilities surrounded by armed guards, and are not connected to the internet or to any other external communication networks. In addition, they are protected from standard side channel attacks by receiving their electricity from local generators and by being surrounding by Faraday cages to prevent any leakage of electromagnetic radiation. The holy grail of cyber attacks is to find a way to reach such unreachable computers. In this talk, I will describe some new experimentally verified techniques which can be used by an outside attacker to establish long range (>1 kilometer) bidirectional communication with such an airgapped computer system that contains only standard untampered hardware components. It is a joint work with Yuval Elovici and Moti Guri.

How to reach the place

Post-Snowden Cryptography

Thursday 11/06 10:00-11:00, B001, Weicker building (SnT)

Abstract: Recently, a series of unprecedented leaks by Edward Snowden had made it possible for the first time to get a glimpse into the actual capabilities and limitations of the techniques used by the NSA to eavesdrop to computers and other communication devices. In this talk, I will survey some of the things we have learned, and discuss possible countermeasures against these capabilities.

How to reach the place