ASHES HOME

ASHES

Welcome to the webpage of the Fifth Workshop on Attacks and Solutions in Hardware Security (ASHES 2021).

ASHES deals with any aspects of hardware security, and welcomes any contributions in this area, including practical, implementation-related, or theoretical works. Among others, ASHES particularly highlights emerging methods and application areas. This includes new attack vectors, novel designs and materials, lightweight security primitives, nanotechnology, and PUFs on the methodological side, as well as the internet of things, automotive security, smart homes, pervasive and wearable computing on the applications side. Please see our call for papers for further details.

In order to meet the requirements of its rapidly developing area, ASHES hosts four categories of papers: Classical full and short papers, as well as systematization of knowledge papers (which overview, structure, and/or categorize a certain subarea), and wild and crazy papers (whose purpose is rapid dissemination of promising, potentially game-changing new ideas without full demonstration). All accepted ASHES papers are invited for extended versions at a special, annually appearing ASHES issue at Springer’s Journal of Cryptographic Engineering (JCEN). Again, our call for papers has all the specifics.

The workshop will include several technical sessions and two invited keynotes, namely Farinaz Koushanfar (UC San Diego) and Ruby Lee (Princeton).

We look forward to seeing you in Seoul, either virtually or physically!

 

Important Dates

  • Paper submission deadline (extended): June 25, 2021 23:59:59 EDT  July 23, 2021 23:59:59 EDT
  • Acceptance notification: August 13, 2021 August 30, 2021
  • Camera-ready deadline: September 6, 2021 September 13, 202

ASHES 2021 Accepted Papers:

1. Kalle Ngo, Elena Dubrova and Thomas Johansson. Breaking Masked and Shuffled CCA Secure Saber KEM by Power Analysis
2. Malik Imran, Felipe Almeida, Jaan Raik, Andrea Basso, Sujoy Roy and Samuel Pagliarini. Design Space Exploration of SABER in 65nm ASIC
3. Erland Wittkotter. WaC: Trustworthy Encryption and Communication in an IT Ecosystem with Artificial Superintelligence
4. Aurélien Vasselle, Hugues Thiebeauld and Philippe Maurine. Spatial Dependency Analysis to Extract Information from Side-Channel Mixtures
5. Wenye Liu and Chip-Hong Chang. A Forward Error Compensation Approach for Fault Resilient Deep Neural Network Accelerator Design
6. Thilo Krachenfels, Jean-Pierre Seifert and Shahin Tajik. Trojan Awakener: Detecting Dormant Malicious Hardware Using Laser Logic State Imaging
7. Rony Komissarov and Avishai Wool. Spoofing Attacks Against Vehicular FMCW Radar
8. Yoo-Seung Won, Soham Chatterjee, Dirmanto Jap, Arindam Basu, Shivam Bhasin. WaC: Practical Side-Channel Attacks on Commercial Machine Learning Accelerator: First Results
9. Kunihiro Kuroda, Yuta Fukuda, Kota Yoshida and Takeshi Fujino. Practical Aspects on Non-profiled Deep-learning Side-channel Attacks against AES software implementation with two types of masking countermeasures including RSM
10. Calvin Deutschbein, Andres Meza, Francesco Restuccia, Ryan Kastner and Cynthia Sturton. Isadora: Automated Information Flow Property Generation for Hardware Designs
11. Tatsuya Oyama, Shunsuke Okura, Kota Yoshida and Takeshi Fujino. Backdoor Attack on Deep Neural Networks Triggered by Fault Injection Attack on Image Sensor Interface