Program
Wednesday April 13th
18:00 - 18:30 Registration @ Burggarten/Orangerie Graz.18:30 - 21:30 Welcome reception @ Burggarten/Orangerie Graz.
Thursday April 14th
Conference at Hotel WEITZER
08:00 | Registration Opens |
08:45 09:00 |
Welcome, Opening Remarks |
09:00 |
Session 1: Security and Physical Attacks |
09:00 |
Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption |
09:30 |
Co-location detection on the Cloud |
10:00 |
Simple Photonic Emission Attack with Reduced Data Complexity |
10:30 11:00 |
Coffee break |
11:00 |
Invited Talk I |
Analyzing thousands of firmware images and a few physical devices. What's next? |
|
12:00 14:00 | Lunch break |
14:00 |
Session 2: Side-Channel Analysis (case studies) |
14:00 |
Power Analysis Attacks against IEEE 802.15.4 Node |
14:30 |
Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series |
15:00 |
Dismantling real-world ECC with Horizontal and Vertical Template Attacks |
15:30 16:00 | Coffee break |
16:00 |
Invited Talk II |
Advanced statistical tests for information leakage. |
|
19:00 |
Social Event: Conference Dinner at Schlossbergrestaurant |
Friday April 15th
Conference at Hotel WEITZER
09:00 |
Session 3: Fault Analysis |
09:00 |
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT |
09:30 |
Improved Differential Fault Analysis on Camellia-128 |
10:00 |
A Note on the Security of CHES 2014 Symmetric Infective Countermeasure |
10:30 11:00 | Coffee break |
11:00 |
Invited Talk III |
Formal and Compositional Proofs of Probing Security for Masked Algorithms |
|
12:00 14:00 |
Lunch break |
14:00 |
Session 4: Side-Channel Analysis (tools) |
14:00 |
Simpler, Faster, and More Robust T-test Based Leakage Detection |
14:30 |
Design and implementation of a waveform-matching based triggering system |
15:00 |
Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order |
15:30 15:35 |
Closing Remarks and Farewell |