[Todos] La letra chica de la seguridad, charla de Martin Abadi, Miercoles 4 Agosto, 13hs, aula E24
Veronica Becher
vbecher en dc.uba.ar
Lun Ago 2 17:32:59 ART 2010
Confirmo el aula y aprovecho para mandar un recordatorio de la charla:
Miércoles 4 de Agosto, a las 13hs, Pabellón I, aula E24
La letra chica de la seguridad
(The fine print of security)
Martín Abadi
Microsoft Research Silicon Valley &
University of California at Santa Cruz
Resumen. Los modelos de seguridad son frecuentemente
útiles pero simplistas: no consideran todos los ataques
posibles. Esta charla tratará el problema de la corrección
de estos modelos, más específicamente para sistemas
criptográficos y para un método de protección de programas
("layout randomization").
(abajo pueden leer un resumen en inglés, más extendido)
¡Están todos invitados!
------------------------------------------------------------------------
"The fine print of security"
Martín Abadi
Microsoft Research Silicon Valley &
University of California at Santa Cruz
Abstract: Simple views of systems are often convenient in their design
and analysis. However, attackers may attempt to exploit any
oversimplification. For security, it is therefore useful to understand
the value and the limitations of simplistic models. Computational
soundness theorems, which are the main subject of this lecture, can
sometimes shed light on this question. We discuss them first in the
context of security protocols. There, two distinct, rigorous views of
cryptography have developed over the years. One of the views relies on a
simple but powerful symbolic approach; the other, on a detailed
computational model that considers issues of probability and complexity.
In the last decade, however, we have made substantial progress in
bridging the gap between these views. This progress, of which a paper
with Phil Rogaway was one of the early steps, is due to many researchers.
By now, this line of work provides computational justifications for
formal treatments of cryptographic operations and security protocols,
and also explores hybrid approaches. Similar ideas can apply in the
domain of software protection, although they are less mature in this
domain. Specifically, we can relate high-level security guarantees,
of the kind offered by programming language semantics, with lower-level
properties of implementations. Layout randomization, one popular and
effective implementation technique, again brings up issues of probability
and complexity.
The lecture introduces some recent work with Gordon Plotkin on this topic.
-------------------------------------------------------------------------
Más información sobre la lista de distribución Todos