The demo computer survived the TSA! #realworldcrypto
A scheme originally intended for disk encryption, not for RAM #realworldcrypto
aTtEsTaTiOn #realworldcrypto
"Please don't crash, please don't crash—" #realworldcrypto
It worked! #realworldcrypto
Attestation is...a bit of a fragile thing in practice #realworldcrypto
Protections were removed to improve performance at customer demand 😭 #realworldcrypto
Q: You believe these protections only got removed bc of performance? A: Yes I do, we talked to the engineers, they were so upset and repeatedly saying "I told you so" etc #realworldcrypto
Next up, 'Migrating a Silicon Root of Trust to Post-Quantum Crypto', presented by Jade Philipoom and Hien Pham #realworldcrypto
Goal is to PQ secure boot chain #realworldcrypto
ML-DSA is dominated by SHA-3 and SHAKE operations #realworldcrypto
Faster than non-PQ options for most operations! #realworldcrypto
'We can do better' #realworldcrypto
Found some speedups in rejection sampling #realworldcrypto
Future treasuremap #realworldcrypto
Research collaboration 🤝 #realworldcrypto
Q: Masking? A: Software masking techniques; random probing model, trying to find the best combo of masking gadgets systematically #realworldcrypto
Next up, 'Chypnosis: Undervolting-based Static Side-channel Attacks', presented by Shahin Tajik #realworldcrypto
Moar attacks on OpenTitan #realworldcrypto
AMD security advisories 😏 #realworldcrypto
Next up, 'Kerckhoff's Principle in Practice: Addressing Security by Obscurity in Secure Hardware', presented by Jan Jancar #realworldcrypto
JavaCards will never die #realworldcrypto
Certified devices...had plenty of vulns #realworldcrypto
'Who would do that? Just lie about elliptic curves?' #realworldcrypto
Just lie to the target 😈 #realworldcrypto
Next up, 'Encryption in the microarchitectural world', presented by Ping-Lun Wang #realworldcrypto
microarchitectural 'weird machines' #realworldcrypto
We can construct weird machines that work across processor classes, despite small changes in microarchitectures #realworldcrypto
END OF DAY 1 #realworldcrypto
DAY 2 Next up is 'Deploying Research: On Building and Shipping an Anonymous Whistleblowing System', presented by Daniel Hugenroth #realworldcrypto
Implemented and deployed in the Guardian app on iOS and Android #realworldcrypto
Really want boring simple cryptography with few assumptions; used Rust bc strong typing enabled misuse-resistant API design, and performance came for free #realworldcrypto
How do we bootstrap trust in the org key? It helps to be part of a long-trusted publication #realworldcrypto
'Words matter' #realworldcrypto
When sufficiently motivated, users do read the manual #realworldcrypto
Secure elements are great tools...except they don't expose auth attempt counters, nor enforce timeouts (they are reserved for the operating system) #realworldcrypto
RainbowSloth key stretching scheme #realworldcrypto
Q: Diff from SecureDrop? A: Focused on the first contact experience; using Tor is a red flag/signal; we don't support sending files, pivot elsewhere for that #realworldcrypto
Work with actual UX researchers; in-person user testing; #realworldcrypto
Speaking of SecureDrop, next up is 'SecureDrop Next Generation: Lessons from a Decade of Deployment', presented by Rowen Shane, Shannon Veitch #realworldcrypto
Uses Tor, PGP encryption, #realworldcrypt
Deployment/maintenance burden, physical security requirement, better encryption is available #realworldcrypto
What do we want from a next-gen SecureDrop? #realworldcrypto
Don't want to leave extra evidence behind #realworldcrypto