schedule
| Monday 13th | |
|---|---|
| 11:00 am - 2:00 pm | Registration |
| 12:00 pm - 2:00 pm | Standing Lunch |
| 2:00 pm - 2:15 pm | Opening Remarks |
| 2:15 pm - 3:15 pm |
Invited Talk I - Security for IoT |
| 3:15 pm - 3:45 pm | Coffee Break |
| 3:45 pm - 4:45 pm Session I IoT Threats & Counter Measures |
Opening Pandora's Box: Effective Techniques for Reverse Engineering IoT Devices |
|
Optimal First-Order Boolean Masking for Embedded IoT Devices |
|
| 6:30 pm - 7:30 pm | Welcome Apero |
| Tuesday 14th | |
| 9:00 am - 10:00 am |
Invited Talk II - White Box Cryptography |
| 10:00 am - 10:30 am | Coffee Break |
| 10:30 am - 12 pm Session II Side Channel Attacks and Methods (I) |
A First-Order Chosen Plaintext DPA Attack on the Third Round of DES |
|
A Strict Key Enumeration Algorithm for Dependent Score Lists of Side-Channel Attacks |
|
|
A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher |
|
| 12:00 pm - 2:00 pm | Lunch |
| 2:00 pm - 3:00 pm Session III Leakage Detection Tools & Methods |
Leakage Bounds for Gaussian Side Channels |
|
Towards Sound and Optimal Leakage Detection Procedure |
|
| 3:00 pm - 3:30 pm | Coffee Break |
| 3:30 pm - 5:00 pm Session IV Counter Measures: Conception & Analysis |
Connecting and Improving Direct Sum Masking and Inner Product Masking |
|
May The Force Be With You: Force-Based Relay Attack Detection |
|
|
Instruction Duplication: Leaky and Not Too Fault-Tolerant! |
|
| 5:45 pm - 10:30 pm | Social Event |
| Wednesday 15th | |
| 9:00 am - 10:00 am |
Invited Talk III - Post Quantum Cryptography |
| 10:00 am - 10:30 am | Coffee Break |
| 10:30 am - 11:00 am Session V Fault Attacks |
An EM Fault Injection Susceptibility Criterion and its Application to the Localization of Hotspots |
|
Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers |
|
| 11:00 am - 12:00 am Session VI Side Channel Attacks and Methods (II) |
Applying Horizontal Clustering Side-channel Attacks on Embedded ECC
Implementations |
|
Trace Augmentation: What Can Be Done Even Before Preprocessing in a Profiled SCA? |
|
| 12:00 pm - 2:00 pm | Closing Remarks & Lunch |







