CARDIS Technical Program
The conference booklet is now available: PDF
The pre-proceedings (password-protected) are now available: ZIP
Dates and Times are UTC +01:00/BST = UK timezone.
Monday, November 7 (Fall School)
Room: The Writers' Suite
10:00-11:00
|
Registration & coffee
|
11:00-12:00
|
Welcome and workshop on the CHERI security features and the ARM Morello prototype implementation (part 1)
|
12:00-13:30
|
Lunch
Edgbaston Park Hotel Restaurant
|
13:30-15:30
|
Workshop on CHERI and Morello (part 2)
|
15:30-16:00
|
Coffee break
|
16:00-16:45
|
Industry talk: Licel (chair: David Oswald)
|
17:00-17:30
|
Campus tour from venue to Computer Science building
|
17:45-20:00
|
Poster Session and reception with drinks and fingerfood
Location: Atrium, Computer Science building
|
Tuesday, November 8
Room: The Writers' Suite
8:30-9:15
|
Registration & coffee
|
9:15-9:30
|
Opening remarks
|
9:30-10:45
|
Session #1: Physical attacks (chair: tba)
Time's a Thief of Memory: Breaking Multi-tenant Isolation in TrustZones through Timing based Bidirectional Covert Channels
Combined Fault Injection and Real-Time Side-Channel Analysis for Android Secure-Boot Bypassing
A Practical Introduction to Side-Channel Extraction of Deep Neural Network Parameters
|
10:45-11:15
|
Coffee break
|
11:15-12:05
|
Session #2: Physical Countermeasures (chair: tba)
A Nearly Tight Proof of Duc et al.s Conjectured Security Bound for Masked Implementations
Short-Iteration Constant-Time GCD and Modular Inversion
|
12:05-14:00
|
Lunch
Edgbaston Park Hotel Restaurant
|
14:00-15:00
|
Keynote #1: Maria Eichlseder (chair: Tobias Schneider)
|
15:00-15:30
|
Coffee break
|
15:30-16:45
|
Session #3: Protecting AES (chair: tba)
Guarding the First Order: The Rise of AES Maskings
Rivain-Prouff on Steroids: Faster and Stronger Masking of the AES
Self-Timed Masking: Implementing Masked S-Boxes Without Registers
|
19:00
|
Conference Dinner
Del Villaggio, 175 Broad Street, Birmingham, B15 1DA
|
Wednesday, November 9
Room: The Composers' Suite
8:30-9:30
|
Registration & coffee
|
9:30-10:45
|
Session #4: Evaluation Methodologies (chair: tba)
An Evaluation Procedure for Comparing Clock Jitter Measurement Methods
Comparing Key Rank Estimation Methods
Cycle-Accurate Power Side-Channel Analysis Using the ChipWhisperer: a Case Study on Gaussian Sampling
|
10:45-11:15
|
Coffee break
|
11:15-12:05
|
Session #5: Attacking NTRU (chair: tba)
Reveal the Invisible Secret: Chosen-Ciphertext Side-Channel Attacks on NTRU
Security Assessment of NTRU Against Non-Profiled SCA
|
12:05-14:00
|
Lunch
Edgbaston Park Hotel Restaurant
|
14:00-15:00
|
Keynote #2: Dan Page (chair: Ileana Buhan)
|
15:00-15:30
|
Coffee break
|
15:30-16:20
|
Session #6: Next-Generation Cryptography (chair: tba)
Post-Quantum Protocols for Banking Applications
Analyzing the Leakage Resistance of the NIST’s Lightweight Crypto Competition’s Finalists
|
16:20-16:35
|
Thanks, awards, closing remarks
|
Booths at the conference site
Two of the most precious commodities in the modern world are data and trust. At Licel, we protect one to safeguard the other. Our products use sophisticated protection techniques and robust cryptographic algorithms that build an in-app chain of trust. Interconnected layers of protection secure apps and SDKs against static and dynamic analysis, tampering, and network attacks. |