-
Notifications
You must be signed in to change notification settings - Fork 2
/
hacs2020.html
73 lines (63 loc) · 3.32 KB
/
hacs2020.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
---
layout: default
title: HACS 2020
date: 2019-07-29
---
<p>
HACS 2020 will be a two-day event in January in New York (5th & 6th January)
followed by an optional hack day (January 7),
all taking place directly before the <a href="https://rwc.iacr.org/2020">IACR Real World Crypto Symposium</a>,
which is scheduled for 8th-10th January also in New York.
The "hack days" in past years
were something many attendees wanted to repeat in future events.
</p>
<p>
As in 2017, HACS will be held in the <b>Vanderbilt Hall of the NYU School of Law at 40 Washington Square S, New York</b>.
For the hack day we'll be at <b>Google, 85 10th Avenue, New York</b>.
</p>
<p>
We will build on the success of the past 3 HACS events by keeping a similar size (somewhere between 60-90 people),
similar facilitation process, and similar attendees.
Our hope for the 2020 meeting is continue to advance the core focus areas while also expanding to consider a broader range of topics including:
</p>
<ul>
<li>
Testing, formal verification, and generation of crypto code.
This has been a core topic area in all three prior HACS events,
and work at HACS 2020 will focus on assessing progress made and work remaining to be done.
</li>
<li>
Formal verification and generation of security proofs for cryptographic protocols,
with the goal of having machine-checked proofs instead of error-prone pencil-and-paper ones.
</li>
<li>
Zero-knowledge topics, including Schnorr, SNARKs/STARKs, bulletproofs,
and pairing-friendly curves, with particular focus on languages, tools and formal methods applied to these topics.
</li>
<li>
Advanced implementation attacks, addressing specific microarchitecture attacks including Spectre and variants,
fault attacks, and power attacks, as well as formal modeling of these attacks and associated countermeasures.
</li>
</ul>
<p>
Considering that previous workshops served to make introductions and start a number of projects,
we will continue adjusting the process to drive collaboration toward concrete outcomes.
We expect a significant number of attendees have ongoing projects and concrete goals in mind.
The organizers will spend significant time before the event discussing what these are and arranging workshop sessions to advance concrete objectives.
</p>
<p>
HACS events to date have already produced <a href="./links.html">significant outcomes</a>
in driving the convergence of cryptographic software and formal and high assurance verification.
We are excited about the potential for the 2020 event to continue this trajectory while also moving in new and compelling directions.
</p>
<h3>Sponsors</h3>
<p>
<img style="height:60px;padding-left:80px;padding-right:80px;padding-bottom:40px" src="./src/logos/apple.svg" alt="Apple"/>
<img style="height:60px;padding-right:30px;padding-bottom:40px" src="./src/logos/aws.png" alt="AWS"/>
<img style="height:60px;padding-right:35px;padding-bottom:40px" src="./src/logos/google.png" alt="Google"/>
<img style="height:60px;padding-right:30px;padding-bottom:40px" src="./src/logos/msft.png" alt="Microsoft"/>
<br>
<img style="height:50px;padding-right:30px;padding-bottom:40px" src="./src/logos/electriccoin.png" alt="Electric Coin Co."/>
<br>
<img style="height:40px;padding-right:30px;padding-bottom:40px" src="./src/logos/arm.svg" alt="ARM"/>
</p>