Foundations of Cybersecurity at FaMAF

This is the webage for the course "Foundations of Cybersecurity," taking place in FaMAF from 2025-02-24 to 2025-03-07.

The course is given by Gilles Barthe (gbarthe.github.io) and Santiago Arranz Olmos (sarranz.github.io), from MPI-SP. The classes are oriented to advanced computer science students, e.g., third year and up, but open to everyone. They are of interest to PhD students, researchers, and anyone interested in developing cybersecurity tools with solid theoretical foundations.

Useful

Dates: February 24th to 28th (five classes), with three extra classes from March 5th to 7th.

Schedule: Starting at 2:00 pm. Three hours per day, one and a half hours each course, and some breaks.

Place: Lab 17, FaMAF (famaf.unc.edu.ar).

Communication: The #funcs25 channel on FaMAF's Zulip (if you are not there, contact Santiago by mail on his page).

Classes

Monday 24th: Provable Security and Spectre

Provable security, one-time pad, reductionist proofs, games, game hops, example proof of CPA security. Cut short because of power outage.

Referenced material:


Tuesday 25th: Side-Channels, Spectre, Big Picture, Semantics

Timing and cache side-channels, Spectre demo, big picture of the research line, operational semantics

Referenced material:


Wednesday 26th: Constant-Time, Relational Hoare Logic

Small-step semantics with observations, definition of constant-time (CT), type system to check CT, relational properties, self-composition, product programs, Hoare logic, Relational Hoare Logic

Referenced material:


Thursday 27th: Type System for CT, Use cases of RHL, Non-Interference and RHL

Type systems, type system for CT, intuition of its soundness, type system for NI, relation with CT, relation with RHL

Referenced material:


Friday 28th: Compiler preservation of CT, Verification Condition Generation for CT

Compiler correctness, preservation of safety properties, forward and backward simulations, preservation of CT with a cube, preservation with transformers, VCGen for CT, synchronous product programs

Referenced material:


Wednesday 5th: Differential Privacy

Definition of differential privacy, applications and examples, apRHL, pRHL

Referenced material: