Nicola Tuveri
About me
I received my M.Sc. Degree in Computer Science from Politecnico di Torino in 2011. During my studies I had the great opportunity of participating in the Erasmus Programme, being hosted in Espoo by Aalto University (at the time it was transitioning from TKK/HUT to Aalto University). There I had a chance to work under the supervision of Billy Bob Brumley and Kaisa Nyberg, working on Software Side-Channel Attacks on Cryptographic Implementations, which later evolved in my current Doctoral Research Project.
Main positions of trust
OpenSSL Technical Commitee
Research topics
Applied Cryptography, Software Side Channel Analysis, OpenSSL, NSS, Post-quantum cryptography deployment
Research unit
Latest publications
OpenSSLNTRU: Faster post-quantum TLS key exchange
Bernstein, D. J., Brumley, B. B., Chen, M-S. & Tuveri, N., 10 Aug 2022, 31st USENIX Security Symposium (USENIX Security '22) : Conference proceedings. The USENIX Association, p. 845-862Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Scientific › peer-review
Secure IT Systems: 26th Nordic Conference, NordSec 2021, Virtual Event, November 29–30, 2021, Proceedings
Tuveri, N. (ed.), Michalas, A. (ed.) & Brumley, B. B. (ed.), 2021, Cham: Springer Nature Switzerland AG. 213 p. (Lecture Notes in Computer Science; vol. 13115)Research output: Book/Report › Anthology › Scientific › peer-review
Certified Side Channels
Pereida García, C., Hassan, S. U., Tuveri, N., Gridin, I., Cabrera Aldaya, A. & Brumley, B. B., 2020, 29th USENIX Security Symposium, USENIX Security 2020. p. 2021-2038 18 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Scientific › peer-review
Batch Binary Weierstrass
Brumley, B. B., Hassan, S. U., Shaindlin, A., Tuveri, N. & Vuojärvi, K., 2 Oct 2019, Progress in Cryptology - LATINCRYPT 2019 - 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2-4, 2019, Proceedings. Schwabe, P. & Thériault, N. (eds.). Springer Verlag, p. 364-384 21 p. (Lecture Notes in Computer Science; vol. 11774).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Scientific › peer-review
Port Contention for Fun and Profit
Cabrera Aldaya, A., Brumley, B. B., ul Hassan, S., Pereida García, C. & Tuveri, N., 20 May 2019, 2019 IEEE Symposium on Security and Privacy (SP) (2019). San Francisco, CA, US: IEEE, p. 1037-1054 18 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Scientific › peer-review
Start your ENGINEs: Dynamically Loadable Contemporary Crypto
Tuveri, N. & Brumley, B., Sept 2019, 2019 IEEE Cybersecurity Development (SecDev).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Scientific › peer-review
Triggerflow: Regression Testing by Advanced Execution Path Inspection
Gridin, I., Pereida García, C., Tuveri, N. & Brumley, B. B., 2019, Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Proceedings. Maurice, C., Giacinto, G., Perdisci, R., Almgren, M. & Perdisci, R. (eds.). Springer Verlag, p. 330-350 21 p. (Lecture Notes in Computer Science; vol. 11543).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Scientific › peer-review
Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study
Tuveri, N., ul Hassan, S., Pereida Garcia, C. & Brumley, B., 3 Dec 2018, ACSAC '18 Proceedings of the 34th Annual Computer Security Applications Conference. New York: ACM, p. 147-160 14 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Scientific › peer-review
Cache-Timing Attacks and Shared Contexts
Brumley, B. B. & Tuveri, N., Feb 2011, p. 233-242. 10 p.Research output: Other conference contribution › Abstract › Scientific
Remote timing attacks are still practical
Brumley, B. & Tuveri, N., 2011, Computer Security, ESORICS 2011 - 16th European Symposium on Research in Computer Security, Proceedings. Vol. 6879 LNCS. p. 355-371 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6879 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Scientific › peer-review