WORKSHOP PROGRAM 2019

ASHES 2019 Workshop Program:

Friday, November 15, 2019

7:30 am – 9:00 am:  REGISTRATION AND BREAKFAST

9:00 am – 9:05 am:  WELCOME

  • Chip Hong Chang (NTU Singapore); Daniel Holcomb (UMass Amherst); Patrick Schaumont (Virginia Tech); Ulrich Rührmair (LMU Munich and U Connecticut):
    Welcome and Workshop Statistics

9:05 am – 10:05 am:  INVITED KEYNOTE I
(Session Chair: François Dupressoir (U Surrey))

  • Francois-Xavier Standaert (UC Louvain):
    Towards an Open Approach to Side-Channel Resistant Authenticated Encryption

10:05 am – 10:15 am:  INTERMEDIATE BREAK, TIME FOR PERSONAL DISCUSSIONS

10:15 am – 11:05 am:  SESSION NO. 1:  PUFS AND PHYSICAL LAYER SECURITY
(Session Chair:  Ujjwal Guin (Auburn U))

  • 10:15 am – 10:30 am:  Chongyan Gu (U Belfast), Chip Hong Chang (NTU Singapore), Weiqiang Liu (Nanjing U), Neil Hanley (U Belfast), Jack Miskelly (U Belfast) and Maire O’Neill (U Belfast):
    A Large Scale Comprehensive Evaluation of Single-Slice Ring Oscillator and PicoPUF Bit Cells on 28nm Xilinx FPGAs (Short Paper)
  • 10:30 am – 10:50 am:  Mitsuru Shiozaki (Ritsumeikan U) and Takeshi Fujino (Ritsumeikan U):
    Simple Electromagnetic Analysis Attacks based on Geometric Leak on an ASIC Implementation of Ring-Oscillator PUF
  • 10:50 am – 11:05 am:  Noriyuki Miura (Kobe U), Tatsuya Machida (Kobe U), Kohei Matsuda (Kobe U), Makoto Nagata (Kobe U), Shoei Nashimoto (Mitsubishi Electric) and Daisuke Suzuki (Mitsubishi Electric):
    A Low-Cost Replica-Based Distance-Spoofing Attack on mmWave FMCW Radar (Short Paper)

11:05 am – 11:15 am:  INTERMEDIATE BREAK, TIME FOR PERSONAL DISCUSSION

11:15 pm – 12:15 pm:  SESSION NO. 2:  SIDE CHANNELS AND FAULT ATTACKS
(Session Chair:  David Oswald (U Birmingham))

  • 11:15 am – 11:35 am:  Aurélien Vasselle (eShard), Philippe Maurine (LIRMM) and Maxime Cozzi (LIRMM):
    Breaking Mobile Firmware Encryption through Near-Field Side-Channel Analysis
  • 11:35 am – 11:55 am:  Keyvan Ramezanpour, Paul Ampadu and William Dieh (all Virginia Tech):
    Fault Intensity Map Analysis with Neural Network Key Distinguisher
  • 11:55 am – 12:15 pm:  Bodo Selmke, Florian Hauschild and Johannes Obermaier (all Fraunhofer AISEC):
    Peak Clock: Fault Injection into PLL-Based Systems via Clock Manipulation

12:15 pm – 1:45 pm:  LUNCH, SOCIALIZING

1:45 pm – 2:45 pm:  INVITED KEYNOTE II
(Session Chair:  Ulrich Rührmair (LMU Munich and U Connecticut))

  • Ross Anderson (Cambridge U):
    30 Years of Tamper Resistance

2:45 pm – 2:55 pm:  INTERMEDIATE BREAK, TIME FOR PERSONAL DISCUSSION

2:55 pm – 3:35 pm:  SESSION NO. 3:  REVERSE ENGINEERING AND TRUSTED MANUFACTURING
(Session Chair:  Máire O’Neill (Queen’s University Belfast))

  • 2:55 pm – 3:15 pm: Leonid Azriel, Ran Ginosar and Avi Mendelson (all Technion):
    SoK: An Overview of Algorithmic Methods in IC Reverse Engineering
  • 3:10 pm – 3:25 pm: Yuqiao Zhang, Pinchen Cui, Ziqi Zhou and Ujjwal Guin (all Auburn U):
    TGA: An Oracle-less and Topology-Guided Attack on Logic Locking

3:35 pm – 3:55 pm:  COFFEE BREAK

3:55 pm – 4:55 pm:  SESSION NO. 4:  FPGA-SECURITY AND MEMORY ATTACKS
(Session Chair:  Marten van Dijk (U Connecticut))

  • 3:55 pm – 4:15 pm:  Sahan Bandara (Boston U) and Michel Kinsy (Boston U):
    Adaptive Caches as a Defense Mechanism Against Cache Side-Channel Attacks
  • 4:15 pm – 4:35 pm:  Florian Unterstein (Fraunhofer AISEC), Nisha Jacob (Belfast U), Neil Hanley (Belfast U), Chongyan Gu (Fraunhofer AISEC) and Johann Heyszl (Fraunhofer AISEC):
    SCA Secure and Updatable Crypto Engines for FPGA SoC Bitstream Decryption
  • 4:35 pm – 4:55 pm:  Mathieu Gross (TU Munich), Nisha Jacob (Fraunhofer AISEC), Andreas Zankl (Fraunhofer ASICE) and Georg Sigl (TU Munich):
    Breaking TrustZone memory isolation through Malicious Hardware on a modern FPGA-SoC

4:55 pm – 5:00 pm:  FAREWELL AND CONCLUDING REMARKS
(Session Chair:  Marten van Dijk (U Connecticut))