FDTC 2015: Final Program (PDF)
| 08:45 – 09:05 | Registration and Early morning break |
| 09:05 – 09:15 | Opening remarks |
| Keynote Talk I
Chair: Sylvain Guilley |
|
|---|---|
| 09:15 – 09:55 | Fault Attacks at the System Level – The Challenge
of Securing Application Software Stefan Mangard |
| Session 1 – Fault Injection: Models and Techniques
Chair: Philippe Loubet-Moundi |
|
| 09:55 – 10:20 | EM Injection: Fault Model and Locality Sebastien Ordas, Ludovic Guillaume-Sage and Philippe Maurine |
| 10:20 – 10:45 | On the Complexity Reduction of Laser Fault Injection Campaigns using OBIC Measurements Falk Schellenberg, Markus Finkeldey, Bastian Richter, Maximilian Schaepers, Nils Gerhardt, Martin Hofmann and Christof Paar |
| 10:45 – 11:10 | Morning break |
| Session 2 – DFA: Models and Techniques
Chair: Guido Bertoni |
|
| 11:10 – 11:35 | Improved Differential Fault Attack on the Block Cipher SPECK Yuming Huo, Fan Zhang, Xiutao Feng and Li-Ping Wang |
| 11:35 – 12:00 | J-DFA: A Novel Approach for Robust Differential Fault Analysis Luca Magri, Silvia Mella, Filippo Melzani, Pasqualina Fragneto and Beatrice Rossi |
| 12:00 – 12:25 | Lost in Translation: Fault Analysis of Infective Security Proofs Alberto Battistello and Christophe Giraud |
| 12:25 – 13:40 | Lunch |
| Keynote Talk II
Chair: Francesco Regazzoni |
|
| 13:40 – 14:20 | The Need for Intrinsic Hardware Security below 65 nm Mathias Wagner |
| Session 3 – Fault Injection Attacks to Cipher Families
Chair: Naofumi Homma |
|
| 14:20 – 14:45 | To Exploit Fault Injection on non-Injective Sboxes Guillaume Bethouart and Nicolas Debande |
| 14:45 – 15:10 | An Efficient One-Bit Model for Differential Fault Analysis on Simon Family Juan Grados, Fabio Borges, Renato Portugal and Pedro Lara |
| 15:10 – 15:35 | Afternoon break |
| Session 4 – Fault Attacks to Cryptographic Devices
Chair: Victor Lomné |
|
| 15:35 – 16:00 | Singular Curve Point Decompression Attack Johannes Blömer and Peter Günther |
| 16:00 – 16:25 | Laser Fault Attack on Physically Unclonable Functions Shahin Tajik, Heiko Lohrke, Fatemeh Ganji, Jean-Pierre Seifert and Christian Boit |
| 16:25 – 16:50 | Improving Fault Attacks on Embedded Software using RISC Pipeline Characterization Bilgiday Yuce, Nahid Farhady Ghalaty and Patrick Schaumont |
| 16:50 – 17:00 | Closing remarks and Farewell |