FDTC 2014: Final Program

08:45 – 09:05 Registration
 
09:05 – 09:15 Opening remarks
 
Keynote Talk
Chair: Jean-Pierre Seifert (TUB)
09:15 – 09:55 Tampering Attacks in Pairing-Based Cryptography
Johannes, Blömer, Peter Günther, Gennadij Liske
 
Session 1 – Physical and Design Security of ICs
Chair: Jean-Luc Danger (ENST)
09:55 – 10:20 On the Effects of Clock and Power Supply Tampering on Two Microcontroller Platforms
Michael Höfler, Thomas Korak
10:20 – 10:45 Parametric Trojans for Fault-Injection Attacks on Cryptographic Hardware
Raghavan Kumar, Philipp Jovanovic, Wayne Burleson, Ilia Polian
 
10:45 – 11:10 Morning break
 
Session 2 – Algebraic and Differential Fault Analysis
Chair: Olivier Benoit (Qualcomm)
11:10 – 11:35 Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering
Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Dawu Gu
11:35 – 12:00 Differential Fault Analysis on the Families of SIMON and SPECK Ciphers
Harshal Tupsamudre, Shikha Bisht, Debdeep Mukhopadhyay
12:00 – 12:25 Differential Fault Intensity Analysis
Nahid Farhady Ghalaty, Bilgiday Yuce, Mostafa Taha, Patrick Schaumont
 
12:25 – 13:40 Lunch
 
Session 3 – Fault Models and Countermeasures
Chair: Wieland Fischer (Infineon)
13:40 – 14:05 Fault Sensitivity Analysis Meets Zero-Value Attack
Oliver Mischke, Amir Moradi, Tim Güneysu
14:05 – 14:30 Countermeasures against High-Order Fault-Injection Attacks on CRT-RSA
Pablo Rauzy, Sylvain Guilley
14:30 – 14:55 On Fault Injections in Generalized Feistel Networks
Hélène Le Bouder, Gaël Thomas, Yanis Linge, Assia Tria
 
14:55 – 15:20 Afternoon break
 
Session 4 – Simulated and Experimental Attacks
Chair: Naofumi Homma (TU)
15:20 – 15:45 Blind Fault Attack against SPN Ciphers
Roman Korkikian, Sylvain Pelissier, David Naccache
15:45 – 16:10 Clock Glitch Attacks in the Presence of Heating
Baris Ege, Thomas Korak, Michael Hutter, Lejla Batina
16:10 – 16:30 Practical Validation of Several Fault Attacks against the Miller Algorithm
Nadia El Mrabet, Jacques Fournier, Louis Goubin, Ronan Lashermes, Marie Paindavoine
16:30 – 16:50 A Practical Second-Order Fault Attack against a Real-World Pairing Implementation
Johannes Blömer, Ricardo Gomes da Silva, Peter Günther, Juliane Krämer, Jean-Pierre Seifert
 
16:50 – 17:00 Closing remarks and Farewell