Konstantinos Athanasiou is a PhD student studying formal methods at Northeastern University’s Khoury College of Computer Sciences, advised by Professor Thomas Wahl. Before joining Northeastern, Konstantinos completed his undergraduate studies at the National Technical University of Athens in Greece. Konstantinos’ research interests lie in software verification, and he has worked in concurrent program verification.
My current work revolves around formal verification of software counter-measures against Side-channel Attacks. Starting my PhD, I wanted my work to revolve around applications of Satisfiability Modulo Theories (SMT) solvers to software verification. The shift towards a security-related application, like Side-channels, is very close to the path I envisioned.
I would like to provide tools for automated and quantitative security evaluation of implementations of encryption algorithms.
The intersection of formal methods and security is somewhat unexplored. Formulating security related question from a formal methods perspective has been so far the most exciting and unexpectedly fascinating part.
Konstantinos Athanasiou is a PhD student studying formal methods at Northeastern University’s Khoury College of Computer Sciences, advised by Professor Thomas Wahl. Before joining Northeastern, Konstantinos completed his undergraduate studies at the National Technical University of Athens in Greece. Konstantinos’ research interests lie in software verification, and he has worked in concurrent program verification.
My current work revolves around formal verification of software counter-measures against Side-channel Attacks. Starting my PhD, I wanted my work to revolve around applications of Satisfiability Modulo Theories (SMT) solvers to software verification. The shift towards a security-related application, like Side-channels, is very close to the path I envisioned.
I would like to provide tools for automated and quantitative security evaluation of implementations of encryption algorithms.
The intersection of formal methods and security is somewhat unexplored. Formulating security related question from a formal methods perspective has been so far the most exciting and unexpectedly fascinating part.