ASHES HOME 2023

ASHES 2023 – Program

 

8:30am to 9:00am:  Possibility for Informal Get-Together and Networking at Workshop Site

9:00am to 9:05am:  WELCOME MESSAGE

  • Lejla Batina (Radboud U, Netherlands), Chip Hong Chang (NTU Singapore, Singapore), Domenic Forte (U Florida, USA), Ulrich Rührmair (TU Berlin, Germany/U Connecticut, USA):
    Welcome and Workshop Statistics

9:05am to 10:05am:  INVITED KEYNOTE I

  • Claire Vishik (formerly Fellow and Group CTO at Intel, now co-founder and CTO of a stealth startup):
    In Search of Trust: 30 Years of Evolution of Trusted Computing and Hardware Security

10:05am to 10:10am:  INTERMEDIATE BREAK

10:10am to 11:10am:  TECHNICAL SESSION I:  Side-Channel Attacks

  • Eduardo Ferrufino (George Mason University, USA), Luke Beckwith (George Mason University, USA), Abubakr Abdulgadir (George Mason Univ, USA), Jens-Peter Kaps (George Mason University, USA):  FOBOS 3: An Open-Source Platform for Side-Channel Analysis and Benchmarking
  • Alok Singh (Virginia Tech, USA), Ryan Gerdes (Virginia Tech, USA): Better Side-Channel Attacks Through Measurements
  • Yanning Ji (KTH Royal Institute of Technology, Sweden), Elena Dubrova (KTH Royal Institute of Technology, Sweden): A Side-Channel Attack on a Masked Hardware Implementation of CRYSTALS-Kyber

11:10am to 11:20am:  INTERMEDIATE BREAK

11:20am to 12:20pm:  TECHNICAL SESSION II:  Novel Attacks and Implementations

  • Shoei Nashimoto (Mitsubishi Electric, Japan), Tomoyuki Nagatsuka (Mitsubishi Electric Engineering, Japan): Cover Chirp Jaming: Hybrid Jamming–Deception Attack on FMCW Radar and Its Countermeasure
  • Tobias Stelzer (Fraunhofer AISEC, Germany), Felix Oberhansl (Fraunhofer AISEC, Germany), Jonas Schupp (Technical University of Munich, TUM School of Computation,  Information and Technology, Germany), Patrick Karl (Technical University of Munich, TUM School of Computation, Information and Technology, Germany): Enabling Lattice-based Post-Quantum Cryptography on the OpenTitan Platform
  • Owen Pemberton (University of Birmingham, United Kingdom), David Oswald (University of Birmingham, United Kingdom): BioLeak: Exploiting Cache Timing to Recover Fingerprint Minutiae Coordinates

12:20pm to 1:30pm:  LUNCH BREAK

1:30pm to 2:30pm:  INVITED KEYNOTE II

  • Ravi Pappu (formerly MIT, now Apeiron Labs, USA):
    Physical Unclonable Functions: The First Fifty Years

2:30pm to 2:35pm:  INTERMEDIATE BREAK

2:35pm to 3:15pm:  TECHNICAL SESSION III:  Artificial Intelligence in Side-Channel Attacks

  • Trevor Hong Eng Yap (Nanyang Technological University, Singapore), Stjepan Picek (Radboud University and TU Delft, Netherlands), Shivam Bhasin (Temasek Laboratories, Nanyang Technological University, Singapore): Beyond the Last Layer: Deep Feature Loss Functions in Side-channel Analysis
  • Madhav Nair (Indian Institute of Technology Kharagpur, India), Rajat Sadhukhan (Indian Institute of Technology Kharagpur, India), Hammond Pearce (New York University, USA), Debdeep Mukhopadhyay (Indian Institute of Technology Kharagpur, India), Ramesh Karri (New York University, USA): Netlist Whisperer: AI and NLP Fight Circuit Leakage! 

3:15pm to 3:25pm:  INTERMEDIATE BREAK

3:25pm to 4:05pm:  TECHNICAL SESSION IV:  Fault Attacks

  • Hikaru Nishiyama (Nara Institute of Science and Technology, Japan), Daisuke Fujimoto (Nara Institute of Science and Technology, Japan), Yuichi Hayashi (Nara Institute of Science and Technology, Japan): Remote Fault Injection Attack against Cryptographic Modules via Intentional Electromagnetic Interference from an Antenna
  • Shungo Hayashi (National Institute of Advanced Industrial Science and Technology, Yokohama National University, Japan), Junichi Sakamoto (National Institute of Advanced Industrial Science and Technology, Yokohama National University, Japan), Masaki Chikano (Yokohama National University, Japan), Tsutomu Matsumoto (National Institute of Advanced Industrial Science and Technology, Yokohama National University, Japan): Effective Layout Design for Laser Fault Sensor on FPGA

4:05pm to 4:15pm:  INTERMEDIATE BREAK

4:15pm to 4:55pm: TECHNICAL SESSION V:  Reverse Engineering

  • Xhani Marvin Saß (TU Berlin, Germany), Thilo Krachenfels (TU Berlin, Germany), Frederik Dermot Pustelnik (TU Berlin, Germany), Jean-Pierre Seifert (TU Berlin, Germany): Modulation to the Rescue: Identifying Sub-Circuitry in the Transistor Morass for Targeted Analysis

(Short Paper)

  • Nils Rothaug (Max Planck Institute for Security and Privacy, Germany), Simon Klix (Max Planck Institute for Security and Privacy, Germany), Nicole Auth (Bundeskriminalamt, Germany), Sinan Böcker (Bundeskriminalamt, Germany), Endres Puschner (Max Planck Institute for Security and Privacy, Germany), Steffen Becker (Ruhr University Bochum & Max Planck Institute for Security and Privacy, Germany), Christof Paar (Max Planck Institute for Security and Privacy, Germany): Towards Unsupervised SEM Image Segmentation for IC Layout Extraction

(Short Paper)

4:55pm to 5:00pm:  CONCLUDING REMARKS AND FAREWELL

5:00pm to 5:30pm:  Possibility for Final Discussions and Exchange at Workshop Site

 

 

TIME SLOTS FOR PRESENTATIONS:

  • All papers:  20min (including questions)