Prof. Daniel Genkin
Daniel Genkin’s research interests are in cryptography and system security. He is interested in both theory and practice with particular interests in side-channel attacks, hardware security, cryptanalysis, secure multiparty computation (MPC), verifiable computation and SNARKS.
He is currently an Assistant Professor at the Department of Electrical Engineering and Computer Science at the University Of Michigan. Before that, he was a Postdoctoral Fellow at the University of Pennsylvania and the University of Maryland, where he was hosted by Prof. Nadia Heninger and Prof. Jonathan Katz. Previously he has been a Ph.D student at the Computer Science Department in the Technion — Israel’s Institute of Technology where he was co-advised by Prof. Yuval Ishai and Prof. Eran Tromer.
The architecture and security communities will remember 2018 as the year of Spectre and Meltdown. Speculative execution, which has been considered for decades to be a harmless and valuable performance feature, has now been discovered as having dangerous industry-wide security implications, affecting operating systems, browsers, virtual machines, trusted execution environments (SGX), as well as others.
In this talk, I will cover the ideas behind the recent Spectre, Meltdown and Foreshadow attacks as well as their implications on computer security. I will also discuss defenses and future work. The talk will be self-contained and include live demonstrations.