ASHES 2019 Workshop Program:
Friday, November 15, 2019
7:30 am – 9:00 am: REGISTRATION AND BREAKFAST
9:00 am – 9:05 am: WELCOME
- Chip Hong Chang (NTU Singapore); Daniel Holcomb (UMass Amherst); Patrick Schaumont (Virginia Tech); Ulrich Rührmair (LMU Munich and U Connecticut):
Welcome and Workshop Statistics
9:05 am – 10:05 am: INVITED KEYNOTE I
(Session Chair: François Dupressoir (U Surrey))
- Francois-Xavier Standaert (UC Louvain):
Towards an Open Approach to Side-Channel Resistant Authenticated Encryption
10:05 am – 10:15 am: INTERMEDIATE BREAK, TIME FOR PERSONAL DISCUSSIONS
10:15 am – 11:05 am: SESSION NO. 1: PUFS AND PHYSICAL LAYER SECURITY
(Session Chair: Ujjwal Guin (Auburn U))
- 10:15 am – 10:30 am: Chongyan Gu (U Belfast), Chip Hong Chang (NTU Singapore), Weiqiang Liu (Nanjing U), Neil Hanley (U Belfast), Jack Miskelly (U Belfast) and Maire O’Neill (U Belfast):
A Large Scale Comprehensive Evaluation of Single-Slice Ring Oscillator and PicoPUF Bit Cells on 28nm Xilinx FPGAs (Short Paper) - 10:30 am – 10:50 am: Mitsuru Shiozaki (Ritsumeikan U) and Takeshi Fujino (Ritsumeikan U):
Simple Electromagnetic Analysis Attacks based on Geometric Leak on an ASIC Implementation of Ring-Oscillator PUF - 10:50 am – 11:05 am: Noriyuki Miura (Kobe U), Tatsuya Machida (Kobe U), Kohei Matsuda (Kobe U), Makoto Nagata (Kobe U), Shoei Nashimoto (Mitsubishi Electric) and Daisuke Suzuki (Mitsubishi Electric):
A Low-Cost Replica-Based Distance-Spoofing Attack on mmWave FMCW Radar (Short Paper)
11:05 am – 11:15 am: INTERMEDIATE BREAK, TIME FOR PERSONAL DISCUSSION
11:15 pm – 12:15 pm: SESSION NO. 2: SIDE CHANNELS AND FAULT ATTACKS
(Session Chair: David Oswald (U Birmingham))
- 11:15 am – 11:35 am: Aurélien Vasselle (eShard), Philippe Maurine (LIRMM) and Maxime Cozzi (LIRMM):
Breaking Mobile Firmware Encryption through Near-Field Side-Channel Analysis - 11:35 am – 11:55 am: Keyvan Ramezanpour, Paul Ampadu and William Dieh (all Virginia Tech):
Fault Intensity Map Analysis with Neural Network Key Distinguisher - 11:55 am – 12:15 pm: Bodo Selmke, Florian Hauschild and Johannes Obermaier (all Fraunhofer AISEC):
Peak Clock: Fault Injection into PLL-Based Systems via Clock Manipulation
12:15 pm – 1:45 pm: LUNCH, SOCIALIZING
1:45 pm – 2:45 pm: INVITED KEYNOTE II
(Session Chair: Ulrich Rührmair (LMU Munich and U Connecticut))
- Ross Anderson (Cambridge U):
30 Years of Tamper Resistance
2:45 pm – 2:55 pm: INTERMEDIATE BREAK, TIME FOR PERSONAL DISCUSSION
2:55 pm – 3:35 pm: SESSION NO. 3: REVERSE ENGINEERING AND TRUSTED MANUFACTURING
(Session Chair: Máire O’Neill (Queen’s University Belfast))
- 2:55 pm – 3:15 pm: Leonid Azriel, Ran Ginosar and Avi Mendelson (all Technion):
SoK: An Overview of Algorithmic Methods in IC Reverse Engineering - 3:10 pm – 3:25 pm: Yuqiao Zhang, Pinchen Cui, Ziqi Zhou and Ujjwal Guin (all Auburn U):
TGA: An Oracle-less and Topology-Guided Attack on Logic Locking
3:35 pm – 3:55 pm: COFFEE BREAK
3:55 pm – 4:55 pm: SESSION NO. 4: FPGA-SECURITY AND MEMORY ATTACKS
(Session Chair: Marten van Dijk (U Connecticut))
- 3:55 pm – 4:15 pm: Sahan Bandara (Boston U) and Michel Kinsy (Boston U):
Adaptive Caches as a Defense Mechanism Against Cache Side-Channel Attacks - 4:15 pm – 4:35 pm: Florian Unterstein (Fraunhofer AISEC), Nisha Jacob (Belfast U), Neil Hanley (Belfast U), Chongyan Gu (Fraunhofer AISEC) and Johann Heyszl (Fraunhofer AISEC):
SCA Secure and Updatable Crypto Engines for FPGA SoC Bitstream Decryption - 4:35 pm – 4:55 pm: Mathieu Gross (TU Munich), Nisha Jacob (Fraunhofer AISEC), Andreas Zankl (Fraunhofer ASICE) and Georg Sigl (TU Munich):
Breaking TrustZone memory isolation through Malicious Hardware on a modern FPGA-SoC
4:55 pm – 5:00 pm: FAREWELL AND CONCLUDING REMARKS
(Session Chair: Marten van Dijk (U Connecticut))