How Geopolitics is Elevating the Importance of Cybersecurity in Aviation: Exploring the Latest Research

Abstract: This seminar spotlights the latest research aimed at boosting aviation security. As the geopolitical landscape shifts, it has exposed key vulnerabilities, especially in digital communications and navigation systems. We will delve into ongoing research efforts focused on strengthening aviation security by pinpointing these vulnerabilities and crafting effective countermeasures to address various potential threats. Join

Xray: Finding Security Vulnerabilities in Arm AXI Implementations Using Model Checking

Abstract: The Arm Advanced eXtensible Interface (AXI) protocols are widely used in bus implementations that connect processors, accelerators, memories, and other IP cores. Any bugs in these implementations can pose a security risk to the correctness of the connected IPs. Malicious or third-party IPs can use such implementation bugs to bypass security mechanisms employed at

ACAI: Protecting Accelerator Execution with Arm Confidential Computing Architecture

Abstract: Trusted execution environments in several existing and upcoming CPUs demonstrate the success of confidential computing, with the caveat that tenants cannot securely use accelerators such as GPUs and FPGAs. In this paper, we reconsider the Arm Confidential Computing Architecture (CCA) design, an upcoming TEE feature in Armv9-A, to address this gap. We observe that

Chain-key Bitcoin

Abstract: Chain-key Bitcoin (ckBTC) is a Bitcoin “layer 2” built on top of the Internet Computer blockchain (IC). It enables both individuals as well as IC smart contracts to transact the deposited Bitcoin cheaply and with a much higher throughput compared to the Bitcoin network. Crucially, ckBTC has no additional trust assumptions other than those