Time | Label | Session |
---|---|---|
08:30 | W10.1 | Opening Session |
08:30 | W10.1.1 | TRUDEVICE: Trustworthy Manufacturing and Utilization of Secure Devices Giorgio Di Natale1, Ilia Polian2, Bossuet Lilian3 and Nicolas Sklavos4 1LIRMM, FR; 2University of Passau, DE; 3University of St. Etienne, FR; 4KNOSSOSnet Research Group / Technological Educational Institute of Western Greece, GR |
08:45 | W10.2 | Keynote Talk 1 Chair: |
08:45 | W10.2.1 | The pros and cons of technological dispersion for security: PUF, TRNG and side-channel countermeasures Jean-Luc Danger, Télécom ParisTech, FR |
09:30 | W10.3 | Session 1 Chair: |
09:30 | W10.3.1 | Analysis and utilization of deviations in RO-PUFs under altered FPGA designs Linus Feiten, Tobias Martin and Bernd Becker, University of Freiburg, DE |
09:45 | W10.3.2 | Ring Oscillators Analysis for FPGA Security Purposes Mario Barbareschi1, Lionel TORRES2 and Giorgio Di Natale3 1University of Naples Federico II, IT; 2LIRMM - University Montpellier 2, FR; 3LIRMM, FR |
10:00 | W10.3.3 | Enhanced TERO-PUF design and characterization with FPGA Cedric Marchand, Abdelkarim Cherkaoui and Bossuet Lilian, University of St. Etienne, FR |
10:15 | W10.3.4 | Implementing Reliable Mechanisms for IP Protection on Low-End FPGA devices Mario Barbareschi, Antonio Mazzea and Pierpaolo Bagnasco, University of Naples Federico II, IT |
10:30 | W10.4 | Poster Session 1 Chair: |
10:30 | W10.4.1 | Functional Locking Modules for Design Protection of Intellectual Property Cores Brice Colombier and Bossuet Lilian, University of St. Etienne, FR |
10:30 | W10.4.2 | 3D-NoC protection capabilities and threats: The TSV risk Martha Johanna Sepulveda1, Guy Gogniat2 and Marius Strum1 1University of São Paulo, BR; 2Universite de Bretagne-Sud / Lab-STICC, FR |
10:30 | W10.4.3 | Hardware Trojans in TRNGs Honorio Martin1, Pedro Paris-Lopez1, Enrique San Millan1, Juan E. Tapidor1 and Nicolas Sklavos2 1University Carlos III of Madrid, ES; 2KNOSSOSnet Research Group / Technological Educational Institute of Western Greece, GR |
10:30 | W10.4.4 | Development of a Layout-Level Hardware Obfuscation Tool Shweta Malik1, Georg T. Becker2, Christof Paar2 and Wayne P. Burleson1 1University of Massachusetts, US; 2Horst Görtz Institute for IT-Security, Ruhr-University Bochum, DE |
10:30 | W10.4.5 | GET - Program for the Generation and Analysis on Nonlinear Elements Stjepan Picek1 and Lejla Batina2 1Faculty of Electrical Engineering and Computing, HR; 2Radboud University Nijmegen, NL |
10:30 | W10.4.6 | Why you should care about leading-edge Software Engineering? Tiziana Margaria, University of Limerick (Ireland) and Lero - The Irish Software Research Center, IE |
10:30 | W10.4.7 | Error detection and correction for lightweight cryptographic algorithms Francesco Regazzoni1, Andrey Bogdanov2, Luca Breveglieri3 and Israel Koren4 1Université catholique de Louvain and ALaRI, CH; 2Technical University of Denmark, DK; 3Polimi, IT; 4University of Massachusetts, US |
10:30 | W10.4.8 | Fine grain partial reconfiguration for fault emulation and precise LUT modification L.A. Cardona1, Bibiana Lorente2 and C. Ferrer3 1IEEC-UAB, ES; 2CNM-CSIC, ES; 3EEC-UAB, ES |
11:30 | W10.5 | Session 2 Chair: |
11:30 | W10.5.1 | Hierarchical Secure DfT Mafalda Cortez1, Said Hamdioui2, Giorgio Di Natale3, Marie-Lise Flottes3 and Bruno Rouzeyre3 1TU Delft, NL; 2Delft University of Technology, NL; 3LIRMM, FR |
12:00 | W10.5.2 | Integrated Sensors: A Backdoor for Hardware Trojan Activation Xuan-Thuy Ngo, Zakaria Najm, Shivam Bhasin, Sylvain Guilley and Jean-Luc Danger, Télécom ParisTech, FR |
13:00 | W10.6 | Keynote Talk 2 Chair: |
13:00 | W10.6.1 | Protecting Cryptographic Implementations on Reconfigurable Devices Tim Güneysu, Ruhr University Bochum, DE |
13:45 | W10.7 | Session 3 Chair: |
13:45 | W10.7.1 | Towards Generic Countermeasures Against Fault Injection Attacks Pablo Rauzy and Sylvian Guilley, Télécom ParisTech, FR |
14:00 | W10.7.2 | Analysis of laser-induced errors: RTL fault model versus layout locality characteristics Athanasios Papadimitriou1, David Hely2, Vincent Beroulle2, Paolo Maistri3 and Regis Leveugle3 1Univ. Grenoble Alpes, LCIS Laboratory, FR; 2Univ. Grenoble Alpes, FR; 3TIMA Laboratory, FR |
14:15 | W10.7.3 | Sensitivity to fault laser injection: a comparison between 28nm bulk and FD-SOI technology Stephan De Castro and Giorgio Di Natale, LIRMM, FR |
14:30 | W10.7.4 | Dynamic Fault Model for Long Duration Laser-Induced Fault Simulation Feng Lu, Giorgio Di Natale, Marie-Lise Flottes and Bruno Rouzeyre, LIRMM, FR |
14:30 | W10.8 | Poster Session 2 Chair: |
14:30 | W10.8.1 | The Influence of Real-Time Scheduling on Differential Power Analysis Attacks Ke Jiang1, Lejla Batina2, Petru Eles1 and Zebo Peng1 1Linköping University, SE; 2Radboud University Nijmegen, NL |
14:30 | W10.8.2 | Exploring RNS in the design of improved RSA implementations Juvenal Araujo, Pedro Matutino, Leonel Sousa and Ricardo Chaves, INESC-ID, IST, Universidade de Lisboa, PT |
14:30 | W10.8.3 | CAESAR and NORX - Developing the Future of Authenticated Encryption Jean-Philippe Aumasson1, Philipp Jovanovic2 and Samuel Neves3 1Kudelski Security, CH; 2University of Passau, DE; 3University of Coimbra, GR |
14:30 | W10.8.4 | Power and Electromagnetic Analysis for Online Template Attacks Margaux Dugardin1, Louiza Papachristodoulou2, Zakaria Najm1, Lejla Batina3, Jean-Luc Danger1, Sylvain Guilley1, Jean-Christophe Courrege4, Anne-Sophie Rivemale4 and Carine Therond4 1Télécom ParisTech, FR; 2Radboud University Nijmegen,, NL; 3Radboud University Nijmegen, NL; 4Thales Communications & Security, FR |
14:30 | W10.8.5 | Search Strategy for Fault Injection using Memetic Algorithms Stjepan Picek1, Pieter Buzing2 and Lejla Batina3 1Faculty of Electrical Engineering and Computing, HR; 2Riscure BV, NL; 3Radboud University Nijmegen, NL |
14:30 | W10.8.6 | Insights into the Correlation between the Processed Data and its Power Traces Miryam Haber, Binyamin Frankel, Moshe Avital, Itamar Levi, Osnat Keren and Alexander Fish, Bar-Ilan University, IL |
14:30 | W10.8.7 | Tuning of randomized windows against simple power analysis for scalar multiplication on elliptic curves Simon Pontie1, Paolo Maistri2 and Regis Leveugle2 1University Grenoble Alpes, FR; 2TIMA Laboratory, FR |
15:00 | W10.9 | Session 4 Chair: |
15:00 | W10.9.1 | Public Key cryptographic primitive design and protection against fault and power analysis attacks Apostolos P. Fournaris and Nicolas Sklavos, KNOSSOSnet Research Group / Technological Educational Institute of Western Greece, GR |
15:15 | W10.9.2 | On the Use of Error Detecting and Correcting Codes to Boost Security in Caches against Side Channel Attacks. Madalin Neagu1, Salvador Manich2 and Liniu Miclea1 1Technical University of Cluj-Napoca, RO; 2Universitat Politecnica de Catalunya, ES |
15:30 | W10.9.3 | A Side-Channel Attack Against Secret Permutation on an Embedded McEliece Cryptosystem Tania Richmond1, Martin Petrvalsky2 and Milos Drutarovsky2 1Univ. St. Etienne, FR; 2Technical University of Kosic, SK |
15:45 | W10.10 | Session 5 Chair: |
15:45 | W10.10.1 | Investigating TERO for Hardware Trojan Horse Detection Paris Kitsos1 and Artemios G. Voyiatzis2 1Technological Educational Institute of Western Greece, GR; 2ISI, GR |
16:00 | W10.10.2 | Insertion and evaluation of Hardware Trojans in Processors Ioannis Voyiatzis, Costas Efstathiou and Thanos Milidonis, Technological Educational Institute of Athens, GR |
16:15 | W10.10.3 | Security of ICs from Hardware Trojans Georgina Kalogeridou1, Andrew W. Moore1, Nicolas Sklavos2 and Odysseas Koufopavlou3 1Computer Laboratory, University of Cambridge, GB; 2KNOSSOSnet Research Group / Technological Educational Institute of Western Greece, GR; 3University of Patras, GR |
16:30 | W10.10.4 | HINT: Holistic Approaches for Integrity of ICT-Systems Ingrid Verbauwhede and Dave Singelee, KU Leuven and UCLA, BE |
16:45 | W10.11 | Closing Session |
16:45 | W10.11.1 | Conclusions & Outlook: Round Table Giorgio Di Natale1, Ilia Polian2, Bossuet Lilian3 and Nicolas Sklavos4 1LIRMM, FR; 2University of Passau, DE; 3University of St. Etienne, FR; 4KNOSSOSnet Research Group / Technological Educational Institute of Western Greece, GR |