FDTC 2020: Final Program (PDF)

FDTC 2020 is a Virtual Conference (Zoom Webinar)
 
Schedule refers to Central European Summer Time (CEST)
 
Start: 13:00 CEST   (7:00 am New York – 8:00 pm Tokyo)
 
13:00 – 13:05 Opening remarks
 
Keynote Talk
Chair: Guido Bertoni
 
13:05 – 13:55 Faulting Hardware from Software, Daniel Gruss, Graz University of Technology

Fault attacks induce misbehavior in a system, thereby possibly compromising the entire system and disclosing confidential data. Traditionally, fault attacks required hardware equipment and local access. In the past five years, some fault attacks have been discovered that require no local access and can instead be mounted from software. We first discuss the Rowhammer attack and how it can subvert a system. We then show that a new primitive, Plundervolt, can similarly lead to system compromise and information disclosure.

Daniel Gruss is Assistant Professor at the Graz University of Technology. He finished his PhD with honors in less than three years. Since 2010, he has been involved in teaching undergraduate courses on operating systems. His research focuses on side channels and security on the hardware-software boundary. His research team was involved in several vulnerability disclosures, including Meltdown and Spectre. Over the past five years, he has co-authored more than 20 top-tier academic publications and has received numerous awards for his research.
 
13:55 – 14:00 Break
 
Session 1 – Multi-Fault Attacks
Chair: Colin O'Flynn
14:00 – 14:25 An End-to-End Approach for Multi-Fault Attack Vulnerability Assessment
Vincent Werner, Laurent Maingault and Marie-Laure Potet
14:25 – 14:50 Countermeasures Optimization in Multiple Fault-Injection Context
Etienne Boespflug, Cristian Ene, Laurent Mounier and Marie-Laure Potet
14:50 – 15:15 SPFA: SFA on Multiple Persistent Faults
Susanne Engels, Falk Schellenberg and Christof Paar
 
15:15 – 15:45 Cofee Break
 
Session 2 – Fault Injection on Primitives and Systems
Chair: Tim Güneysu
 
15:45 – 16:10 Attacking Hardware Random Number Generators in a Multi-Tenant Scenario
Yrjo Koyen, Adriaan Peetermans, Vladimir Rozic and Ingrid Verbauwhede
16:10 – 16:35 Single-bit Laser Fault Model in NOR Flash Memories: Analysis and Exploitation
Menu Alexandre, Jean-Max Dutertre, Jean-Baptiste Rigaud, Jean-Luc Danger, Brice Colombier and Pierre-Alain Moëllic
16:35 – 17:00 Trouble at the CSIDH: Protecting CSIDH with Dummy-Operations against Fault Injection Attacks
Fabio Campos, Matthias J. Kannwischer, Michael Meyer, Hiroshi Onuki and Marc Stöttinger
17:00 – 17:25 SiliconToaster: A Cheap and Programmable EM Injector for Extracting Secrets
Karim Abdellatif and Olivier Hériveaux
 
17:25 – 17:30 Closing remarks and Farewell