Presentation

Research directions

  • Vulnerability analysis

    • The engineering view, and experience acquirement

    • Formal approaches for vulnerability analysis

    • Hardware vulnerability analysis
    • Side-channel analysis of post-quantum cryptography
  • Malware analysis

    • Behavioral malware analysis

    • Malware and signature generation

    • Bare-metal analysis using side-channel information