WORKSHOP PROGRAM 2022

ASHES 2022 – Program

 

9:00am to 9:05am:  Welcome Message

  • Chip Hong Chang (NTU Singapore, Singapore), Domenic Forte (U Florida, USA),
    Debdeep Mukhopadhyay (IIT Kharagpur, India), Ulrich Rührmair (LMU München, Germany/U Connecticut, USA):
    Welcome and Workshop Statistics

9:05am to 10:05am:  INVITED KEYNOTE I

  • Marten van Dijk (CWI Amsterdam, Netherlands/U Connecticut, USA):
    Towards Remote Verifiable Computation without Digital Secrets

10:05am to 10:15am:  INTERMEDIATE BREAK

10:15am 11:25am:  TECHNICAL SESSION I:  Microarchitectural and Side Channel Attacks

  • Jens Trautmann (FAU Erlangen-Nürnberg, Germany), Nikolaos Patsiatzis (FAU Erlangen-Nürnberg, Germany), Andreas Becher (TU Ilmenau, Germany), Stefan Wildermann (FAU Erlangen-Nürnberg, Germany) and Jürgen Teich (FAU Erlangen-Nürnberg, Germany):
    Putting IMT to the Test: Revisiting and Expanding Interval Matching Techniques and their Calibration for SCA
  • Milad Seddigh (Shahid Beheshti U, Iran), Mahdi Esfahani (Sharif U of Technology, Iran), Sarani Bhattacharya (IMEC, Belgium), Mohammad Reza Aref (Sharif U of Technology, Iran) and Hadi Soleimany (Shahid Beheshti U, Iran):
    Breaking KASLR on Mobile Devices without Any Use of Cache Memory
  • Furkan Aydin and Aydin Aysu (both North Carolina State U, USA):
    RESEAL: Exposing and Mitigating Side-Channel Leakage of SEAL Homomorphic Encryption Library
    (Short Paper)

11:25am to 11:35am:  INTERMEDIATE BREAK

11:35am to 12:50pm:  TECHNICAL SESSION II:  Defenses and New Security Mechanisms

  • Muayad Aljafar (Tallin U of Technology, Estonia), Florence Azaïs (U Montpellier/CRNS, France), Marie-Lise Flottes
    (U Montpellier/CRNS, France) and Samuel Pagliarini (Tallin U of Technology, Estonia):
    Leveraging Layout-based Effects for Locking Analog ICs
  • Amit Choudhari (Ecole Polytechnique, France), Sylvain Guilley (Secure-iC, France) and Khaled Karray (Secure-iC, France):
    SpecDefender: Transient execution attack defender using performance counters
  • Alexander Wagner, Felix Oberhansl and Marc Schink (all Fraunhofer AISEC, Germany):
    To Be, or Not to Be Stateful: Post-Quantum Secure Boot using Hash-Based Signatures

12:50pm to 2pm:  LUNCH BREAK

2pm to 3pm:  INVITED KEYNOTE II

  • Yuval Yarom (U Adelaide, Australia):
    Automating Cryptographic Code Generation

3pm to 3:10pm:  INTERMEDIATE BREAK

3:10pm to 4pm:  TECHNICAL SESSION III:  PUFs and Physical Security

  • Lars Tebelmann, Moritz Wettermann and Michael Pehl (all TU Munich, Germany):
    On-Chip Side-Channel Analysis of the Loop PUF
  • Marziyeh Rezaei, Liban Hussein and Sajjad Moazeni (all U of Washington, USA)
    Secure FMCW LiDAR Systems with Frequency Encryption

4pm to 4:10pm:  INTERMEDIATE BREAK

4:10pm to 5:20pm:  TECHNICAL SESSION IV:  Fault Attacks and FPGAs

  • Amit Jana and Goutam Paul (both Indian Statistical Institute, India):
    Differential Fault Attack on PHOTON-Beetle
  • Raphael Viera, Jean-Max Dutertre and Rodrigo Silva Lima (all Mines Saint-Etienne, France):
    Injecting Permanent Faults into the Flash Memory of a Microcontroller with Laser Illumination During Read Operations
  • Emre Karabulut, Chandu Yuvarajappa, Mohammed Iliyas Shaik, Seetal Potluri, Amro Awad and Aydin Aysu
    (all North Carolina State U, USA):
    PR Crisis: Analyzing and Fixing Partial Reconfiguration in Multi-Tenant Cloud FPGAs
    (Short Paper)

5:20pm to 5:25pm:  FAREWELL AND CONCLUDING REMARKS

 

TIME SLOTS FOR PRESENTATIONS:

  • Regular papers:  25min (including questions)
  • Short papers:  20min (including questions)