SPRINGER
LNCS

sponsored by


GOLD SPONSORS

Infineon

NewAE Technology Inc.

NXP

Riscure

Secure-IC

SILVER SPONSORS

Cryptography Research

Oberthur Technologies

Program


Presentation Slides Download


Wednesday April 13th

18:00 - 18:30 Registration @ Burggarten/Orangerie Graz.
18:30 - 21:30 Welcome reception @ Burggarten/Orangerie Graz.

Thursday April 14th

Conference at Hotel WEITZER

08:00

Registration Opens

08:45
09:00

Welcome, Opening Remarks

09:00
-
10:30

Session 1: Security and Physical Attacks

09:00

Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption
Thomas Unterluggauer and Stefan Mangard

09:30

Co-location detection on the Cloud
Mehmet Sinan Inci, Berk Gulmezoglu, Thomas Eisenbarth and Berk Sunar

10:00

Simple Photonic Emission Attack with Reduced Data Complexity
Elad Carmon, Jean-Pierre Seifert and Avishai Wool

10:30
11:00

Coffee break

11:00
-
12:00

Invited Talk I

Analyzing thousands of firmware images and a few physical devices. What's next?
Aurélien Francillon

12:00
14:00

Lunch break

14:00
-
15:30

Session 2: Side-Channel Analysis (case studies)

14:00

Power Analysis Attacks against IEEE 802.15.4 Node
Colin O'Flynn and Zhizhang Chen

14:30

Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series
Amir Moradi and Tobias Schneider

15:00

Dismantling real-world ECC with Horizontal and Vertical Template Attacks
Margaux Dugardin, Louiza Papachristodoulou, Zakaria Najm, Lejla Batina, Jean-Luc Danger and Sylvain Guilley

15:30
16:00

Coffee break

16:00
-
17:00

Invited Talk II

Advanced statistical tests for information leakage.
Tom Chothia

19:00
-
23:00

Social Event: Conference Dinner at Schlossbergrestaurant

Friday April 15th

Conference at Hotel WEITZER

09:00
-
10:30

Session 3: Fault Analysis

09:00

Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT
Àgnes Kiss, Juliane Krämer, Pablo Rauzy and Jean-Pierre Seifert

09:30

Improved Differential Fault Analysis on Camellia-128
Toru Akishita and Noboru Kunihiro

10:00

A Note on the Security of CHES 2014 Symmetric Infective Countermeasure
Alberto Battistello and Christophe Giraud

10:30
11:00

Coffee break

11:00
-
12:00

Invited Talk III

Formal and Compositional Proofs of Probing Security for Masked Algorithms
François Dupressoir

12:00
14:00

Lunch break

14:00
-
15:30

Session 4: Side-Channel Analysis (tools)

14:00

Simpler, Faster, and More Robust T-test Based Leakage Detection
A. Adam Ding, Cong Chen and Thomas Eisenbarth

14:30

Design and implementation of a waveform-matching based triggering system
Arthur Beckers, Josep Balasch, Benedikt Gierlichs and Ingrid Verbauwhede

15:00

Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order
Tobias Schneider, Amir Moradi and Tim Güneysu

15:30
15:35

Closing Remarks and Farewell


Organised by
IAIK - Institute for Applied Information Processing and Communications