FDTC 2014: Final Program
08:45 – 09:05 | Registration |
09:05 – 09:15 | Opening remarks |
Keynote Talk
Chair: Jean-Pierre Seifert (TUB) |
|
---|---|
09:15 – 09:55 | Tampering Attacks in Pairing-Based Cryptography Johannes, Blömer, Peter Günther, Gennadij Liske |
Session 1 – Physical and Design Security of ICs
Chair: Jean-Luc Danger (ENST) |
|
09:55 – 10:20 | On the Effects of Clock and Power Supply Tampering on Two Microcontroller Platforms Michael Höfler, Thomas Korak |
10:20 – 10:45 | Parametric Trojans for Fault-Injection Attacks on Cryptographic Hardware Raghavan Kumar, Philipp Jovanovic, Wayne Burleson, Ilia Polian |
10:45 – 11:10 | Morning break |
Session 2 – Algebraic and Differential Fault Analysis
Chair: Olivier Benoit (Qualcomm) |
|
11:10 – 11:35 | Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Dawu Gu |
11:35 – 12:00 | Differential Fault Analysis on the Families of SIMON and SPECK Ciphers Harshal Tupsamudre, Shikha Bisht, Debdeep Mukhopadhyay |
12:00 – 12:25 | Differential Fault Intensity Analysis Nahid Farhady Ghalaty, Bilgiday Yuce, Mostafa Taha, Patrick Schaumont |
12:25 – 13:40 | Lunch |
Session 3 – Fault Models and Countermeasures
Chair: Wieland Fischer (Infineon) |
|
13:40 – 14:05 | Fault Sensitivity Analysis Meets Zero-Value Attack Oliver Mischke, Amir Moradi, Tim Güneysu |
14:05 – 14:30 | Countermeasures against High-Order Fault-Injection Attacks on CRT-RSA Pablo Rauzy, Sylvain Guilley |
14:30 – 14:55 | On Fault Injections in Generalized Feistel Networks Hélène Le Bouder, Gaël Thomas, Yanis Linge, Assia Tria |
14:55 – 15:20 | Afternoon break |
Session 4 – Simulated and Experimental Attacks
Chair: Naofumi Homma (TU) |
|
15:20 – 15:45 | Blind Fault Attack against SPN Ciphers Roman Korkikian, Sylvain Pelissier, David Naccache |
15:45 – 16:10 | Clock Glitch Attacks in the Presence of Heating Baris Ege, Thomas Korak, Michael Hutter, Lejla Batina |
16:10 – 16:30 | Practical Validation of Several Fault Attacks against the Miller Algorithm Nadia El Mrabet, Jacques Fournier, Louis Goubin, Ronan Lashermes, Marie Paindavoine |
16:30 – 16:50 | A Practical Second-Order Fault Attack against a Real-World Pairing Implementation Johannes Blömer, Ricardo Gomes da Silva, Peter Günther, Juliane Krämer, Jean-Pierre Seifert |
16:50 – 17:00 | Closing remarks and Farewell |