FDTC 2015: Final Program (PDF)

08:45 – 09:05 Registration and Early morning break
09:05 – 09:15 Opening remarks
Keynote Talk I
Chair: Sylvain Guilley
09:15 – 09:55 Fault Attacks at the System Level – The Challenge of Securing Application Software
Stefan Mangard
Session 1 – Fault Injection: Models and Techniques
Chair: Philippe Loubet-Moundi
09:55 – 10:20 EM Injection: Fault Model and Locality
Sebastien Ordas, Ludovic Guillaume-Sage and Philippe Maurine
10:20 – 10:45 On the Complexity Reduction of Laser Fault Injection Campaigns using OBIC Measurements
Falk Schellenberg, Markus Finkeldey, Bastian Richter, Maximilian Schaepers, Nils Gerhardt, Martin Hofmann and Christof Paar
10:45 – 11:10 Morning break
Session 2 – DFA: Models and Techniques
Chair: Guido Bertoni
11:10 – 11:35 Improved Differential Fault Attack on the Block Cipher SPECK
Yuming Huo, Fan Zhang, Xiutao Feng and Li-Ping Wang
11:35 – 12:00 J-DFA: A Novel Approach for Robust Differential Fault Analysis
Luca Magri, Silvia Mella, Filippo Melzani, Pasqualina Fragneto and Beatrice Rossi
12:00 – 12:25 Lost in Translation: Fault Analysis of Infective Security Proofs
Alberto Battistello and Christophe Giraud
12:25 – 13:40 Lunch
Keynote Talk II
Chair: Francesco Regazzoni
13:40 – 14:20 The Need for Intrinsic Hardware Security below 65 nm
Mathias Wagner
Session 3 – Fault Injection Attacks to Cipher Families
Chair: Naofumi Homma
14:20 – 14:45 To Exploit Fault Injection on non-Injective Sboxes
Guillaume Bethouart and Nicolas Debande
14:45 – 15:10 An Efficient One-Bit Model for Differential Fault Analysis on Simon Family
Juan Grados, Fabio Borges, Renato Portugal and Pedro Lara
15:10 – 15:35 Afternoon break
Session 4 – Fault Attacks to Cryptographic Devices
Chair: Victor Lomné
15:35 – 16:00 Singular Curve Point Decompression Attack
Johannes Blömer and Peter Günther
16:00 – 16:25 Laser Fault Attack on Physically Unclonable Functions
Shahin Tajik, Heiko Lohrke, Fatemeh Ganji, Jean-Pierre Seifert and Christian Boit
16:25 – 16:50 Improving Fault Attacks on Embedded Software using RISC Pipeline Characterization
Bilgiday Yuce, Nahid Farhady Ghalaty and Patrick Schaumont
16:50 – 17:00 Closing remarks and Farewell