FDTC 2014: Presentation Slides
Opening remarks – List of participants | |
Keynote Talk | |
---|---|
Tampering Attacks in Pairing-Based Cryptography Johannes, Blömer, Peter Günther, Gennadij Liske |
|
Session 1 – Physical and Design Security of ICs | |
On the Effects of Clock and Power Supply Tampering on Two Microcontroller Platforms Michael Höfler, Thomas Korak |
|
Parametric Trojans for Fault-Injection Attacks on Cryptographic Hardware Raghavan Kumar, Philipp Jovanovic, Wayne Burleson, Ilia Polian |
|
Session 2 – Algebraic and Differential Fault Analysis | |
Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Dawu Gu |
|
Differential Fault Analysis on the Families of SIMON and SPECK Ciphers Harshal Tupsamudre, Shikha Bisht, Debdeep Mukhopadhyay |
|
Differential Fault Intensity Analysis Nahid Farhady Ghalaty, Bilgiday Yuce, Mostafa Taha, Patrick Schaumont |
|
Session 3 – Fault Models and Countermeasures | |
Fault Sensitivity Analysis Meets Zero-Value Attack Oliver Mischke, Amir Moradi, Tim Güneysu |
|
Countermeasures against High-Order Fault-Injection Attacks on CRT-RSA Pablo Rauzy, Sylvain Guilley |
|
On Fault Injections in Generalized Feistel Networks Hélène Le Bouder, Gaël Thomas, Yanis Linge, Assia Tria |
|
Session 4 – Simulated and Experimental Attacks | |
Blind Fault Attack against SPN Ciphers Roman Korkikian, Sylvain Pelissier, David Naccache |
|
Clock Glitch Attacks in the Presence of Heating Baris Ege, Thomas Korak, Michael Hutter, Lejla Batina |
|
Practical Validation of Several Fault Attacks against the Miller Algorithm Nadia El Mrabet, Jacques Fournier, Louis Goubin, Ronan Lashermes, Marie Paindavoine |
|
A Practical Second-Order Fault Attack against a Real-World Pairing Implementation Johannes Blömer, Ricardo Gomes da Silva, Peter Günther, Juliane Krämer, Jean-Pierre Seifert |
|