The University of Birmingham and CARDIS banner

CARDIS Technical Program

The conference booklet is now available: PDF

The pre-proceedings (password-protected) are now available: ZIP

Dates and Times are UTC +01:00/BST = UK timezone.

Monday, November 7 (Fall School)

Room: The Writers' Suite

10:00-11:00
Registration & coffee
11:00-12:00
Welcome and workshop on the CHERI security features and the ARM Morello prototype implementation (part 1)
Jennifer Jackson, Matthew Bowden, Jacqui Henes​, David Oswald
12:00-13:30
Lunch
Edgbaston Park Hotel Restaurant
13:30-15:30
Workshop on CHERI and Morello (part 2)
Jennifer Jackson, Matthew Bowden, Jacqui Henes​, David Oswald
15:30-16:00
Coffee break
16:00-16:45
Industry talk: Licel (chair: David Oswald)
17:00-17:30
Campus tour from venue to Computer Science building
17:45-20:00
Poster Session and reception with drinks and fingerfood

Tuesday, November 8

Room: The Writers' Suite

8:30-9:15
Registration & coffee
9:15-9:30
Opening remarks
David Oswald, Ileana Buhan, Tobias Schneider
9:30-10:45
Session #1: Physical attacks (chair: tba)

Time's a Thief of Memory: Breaking Multi-tenant Isolation in TrustZones through Timing based Bidirectional Covert Channels
Nimish Mishra, Anirban Chakraborty, Urbi Chatterjee, Debdeep Mukhopadhyay

Combined Fault Injection and Real-Time Side-Channel Analysis for Android Secure-Boot Bypassing
Clément Fanjas, Clément Gaine, Driss Aboulkassimi, Simon Pontié, Olivier Potin

A Practical Introduction to Side-Channel Extraction of Deep Neural Network Parameters
Raphaël Joud, Pierre-Alain Moëllic, Simon Pontié, Jean-Baptiste Rigaud

10:45-11:15
Coffee break
11:15-12:05
Session #2: Physical Countermeasures (chair: tba)

A Nearly Tight Proof of Duc et al.s Conjectured Security Bound for Masked Implementations
Loïc Masure, Olivier Rioul, François-Xavier Standaert

Short-Iteration Constant-Time GCD and Modular Inversion
Yaoan Jin, Atsuko Miyaji

12:05-14:00
Lunch
Edgbaston Park Hotel Restaurant
14:00-15:00
Keynote #1: Maria Eichlseder (chair: Tobias Schneider)
15:00-15:30
Coffee break
15:30-16:45
Session #3: Protecting AES (chair: tba)

Guarding the First Order: The Rise of AES Maskings
Amund Askeland, Siemen Dhooghe, Svetla Nikova, Vincent Rijmen, Zhenda Zhang

Rivain-Prouff on Steroids: Faster and Stronger Masking of the AES
Luan Cardoso dos Santos, Francois Gerard, Johann Groszschaedl, Lorenzo Spignoli

Self-Timed Masking: Implementing Masked S-Boxes Without Registers
Mateus Simões, Lilian Bossuet, Nicolas Bruneau, Vincent Grosso, Patrick Haddad, Thomas Sarno

19:00
Conference Dinner
Del Villaggio, 175 Broad Street, Birmingham, B15 1DA

Wednesday, November 9

Room: The Composers' Suite

8:30-9:30
Registration & coffee
9:30-10:45
Session #4: Evaluation Methodologies (chair: tba)

An Evaluation Procedure for Comparing Clock Jitter Measurement Methods
Arturo Mollinedo Garay, Florent Bernard, Viktor Fischer, Patrick Haddad, Ugo Mureddu

Comparing Key Rank Estimation Methods
Rebecca Young, Luke Mather, Elisabeth Oswald

Cycle-Accurate Power Side-Channel Analysis Using the ChipWhisperer: a Case Study on Gaussian Sampling
Nils Wisiol, Patrick Gersch, Jean-Pierre Seifert

10:45-11:15
Coffee break
11:15-12:05
Session #5: Attacking NTRU (chair: tba)

Reveal the Invisible Secret: Chosen-Ciphertext Side-Channel Attacks on NTRU
Zhuang Xu, Owen Pemberton, David Oswald, Zhiming Zheng

Security Assessment of NTRU Against Non-Profiled SCA
Luk Bettale, Julien Eynard, Simon Montoya, Guénaël Renault, Rémi Strullu

12:05-14:00
Lunch
Edgbaston Park Hotel Restaurant
14:00-15:00
Keynote #2: Dan Page (chair: Ileana Buhan)
15:00-15:30
Coffee break
15:30-16:20
Session #6: Next-Generation Cryptography (chair: tba)

Post-Quantum Protocols for Banking Applications
Luk Bettale, Marco De Oliveira, Emmanuelle Dottax

Analyzing the Leakage Resistance of the NIST’s Lightweight Crypto Competition’s Finalists
Corentin Verhamme, Gaëtan Cassiers, François-Xavier Standaert

16:20-16:35
Thanks, awards, closing remarks

Booths at the conference site

Two of the most precious commodities in the modern world are data and trust. At Licel, we protect one to safeguard the other. Our products use sophisticated protection techniques and robust cryptographic algorithms that build an in-app chain of trust. Interconnected layers of protection secure apps and SDKs against static and dynamic analysis, tampering, and network attacks.