WORKSHOP PROGRAM

ASHES 2017 Workshop Program:

Friday, November 3, 2017

7:30 am – 8:50 am: REGISTRATION

8:50 am – 9:00 am:  WELCOME

9:00 am – 10:00 am:  INVITED KEYNOTE

  • Srini Devadas (MIT):
    Secure Hardware and Cryptography: Contrasts, Synergies and Challenges

10:00 am – 10:25 am:  COFFEE BREAK

10:25 am – 11:25 am:  INVITED KEYNOTE

  • Ahmad-Reza Sadeghi (TU Darmstadt):
    Hardware-Assisted Security: Promises, Pitfalls and Opportunities

11:25 am – 12:15 pm:  SESSION NO. 1:  SOLUTIONS IN HARDWARE SECURITY

  • 11:25 am – 11:50 am:  Giovanni Di Crescenzo (Vencore Labs), Jeyavijayan Rajendran (UT Dallas), Ramesh Karri (NYU), Nasir Memon (NYU) and Yevgenij Dodis (NYU):
    Boolean Circuit Camouflaging: Cryptographic Models, Limitations, Provable Results, and a Random Oracle Realization
  • 11:50 am – 12:15 am:  Charles Suslowicz , Archanaa S Krishnan and Patrick Schaumont (all Virginia Tech):
    Optimizing Cryptography in Energy Harvesting Applications

12:15 pm – 2:00 pm:  LUNCH, SOCIALIZING

2:00 pm – 3:00 pm:  INVITED KEYNOTE

  • Ulfar Erlingsson (Google):
    Data-driven Software Security and its Hardware Support

3:00 pm – 3:30 pm:  COFFEE BREAK

3:30 pm – 4:10 pm:  SESSION NO. 2:  WaC & SoK

  • 3:30 pm – 3:45 pm:  Yan Michalevsky and Yonatan Winetraub (both Stanford):
    WaC: SpaceTEE – Secure and Tamper-Proof Computing in Space using CubeSats
  • 3:45 pm – 4:10 pm:  Hoda Maleki, Reza Rahaeimehr and Marten van Dijk (all University of Connecticut):
    SoK: A Survey of Clone Detection Approaches in RFID-based Supply Chains

4:10 pm – 5:00 pm:  SESSION NO. 3:  ATTACKS IN HARDWARE SECURITY

  • 4:10 pm – 4:35 pm: Lars Tebelmann, Michael Pehl and Georg Sigl (all TU München):
    EM Attack on BCH-based Error Correction for PUF-based Key Generation
  • 4:35 pm – 5:00 pm: Varnavas Papaioannou and Nicolas Courtois (both University College London): 
    On the Feasibility and Performance of Rowhammer Attacks