FDTC 2021 – Eighteenth Workshop on Fault Diagnosis and Tolerance in Cryptography September 17-th, 2021, Virtual Workshop (co-located with CHES 2021 - https://ches.iacr.org/2021) FDTC 2021 is held in cooperation (http://iacr.org/icw) with IACR (http://iacr.org). Fault injection is one of the most exploited means for extracting confidential information from embedded devices and for compromising their intended operation. Therefore, research on established as well as upcoming methodologies, and techniques for fault injection, architectures and design tools for the design of robust and protected cryptographic systems and embedded devices (both hardware and software), are essential. Fault injection case studies on popular categories of embedded devices like mobile phones, industrial control devices, hardware wallets for cryptocurrencies, security tokens, etc., are of high interest to improve the understanding of the implications on realistic applications. FDTC is the reference event in the field of fault injection appliances, fault attacks and countermeasures. Topics of interest include but are not limited to: - Fault injection setups and praxis: - novel and improved mechanisms for fault injection, e.g., using lasers, electromagnetic induction, or clock / power supply manipulation - practical issues in fault injection setups and validation results - practical limitations of attacks and implications for security - Case studies: - attacks on cryptographic implementations - attacks on embedded devices like mobile phones, industrial control devices, hardware wallets for cryptocurrencies, security tokens, smartcards, etc. - Attacks on Machine Learning architectures - validation of earlier results - Related highly-invasive attacks on device security: - setups and practical results from invasive attacks, such as photonic emission analysis, laser thermal imaging, laser-voltage imaging, etc. - practical issues, limitations and potential - Countermeasures (detection, resistance and tolerance): - countermeasures for cryptographic implementations - countermeasures for firmware of embedded devices, e.g., for bootloaders - detection countermeasures, e.g., control flow integrity - HW/SW co-design countermeasures for CPU architectures - Design tools for analysis of fault attacks and countermeasures: - early estimation of fault attack robustness - automatic applications of fault countermeasures Important dates (2021): Submission deadline: June 1 Notification of final acceptance: July 14 Final version (camera-ready): Aug. 14 Workshop: Sept. 17 (virtual) Program chairs: Debdeep Mukhopadhyay IIT Kharagpur Emmanuel Prouff ANSSI Program committee (tentative): Michel Agoyan STMicroelectronics Lejla Batina Radboud University Shivam Bhasin Temasek Labs Luca Breveglieri Politecnico di Milano Ileana Buhan Riscure Jessy Clédière CEA LETI Jean-Max Dutertre Ecole des Mines de Saint-Etienne Wieland Fischer Infineon Technologies Christophe Giraud IDEMIA Jorge Guajardo Bosch US Sylvain Guilley Telecom ParisTech Olivier Hériveaux Ledger Johann Heyszl Fraunhofer Osnat Keren Bar Ilan University Israel Koren University of Massachusetts Amherst Victor Lomné Ninjalab Philippe Loubet Moundi Gemalto Philippe Maurine University of Montpellier Joan Mazenc Thales Mehran Mozaffari Kermani University of South Florida Cristofaro Mune Realize Colin O'Flynn NewAE Technology Inc. David Oswald University of Birmingham Sikhar Patranabis VISA Research, USA Gerardo Pelosi Politecnico di Milano Ilia Polian University of Stuttgart Robert Primas TUGraz Chester Rebeiro IIT Madras Lionel Rivière eShard Falk Schellenberg MPI Bochum Sergei Skorobogatov University of Cambridge Takeshi Sugawara Univ. of Electro. Communications Shahin Tajik Worcester Polytechnic Institute Junko Takahashi NTT Christian Toulemont SERMA Michael Tunstall Cryptography Research Vincent Verneuil NXP Semiconductors Fan Zhang Zhejiang University Chairs (general, publication, finance, sponsorship): Michael Tunstall Cryptography Research Luca Breveglieri Politecnico di Milano Israel Koren University of Massachusetts Guido Marco Bertoni Security Pattern Steering committee: Luca Breveglieri Politecnico di Milano Israel Koren University of Massachusetts David Naccache (chair) ENS de Paris Jean-Pierre Seifert TU Berlin & T-Labs Instructions for authors: Submissions must not substantially duplicate work that any of the authors have published elsewhere or that has been submitted in parallel to any other conference or workshop. Submissions should be anonymous, with no author names, affiliations, acknowledgments, or obvious references. Papers should be up to 12 pages (including the bibliography and appendices) and must be formatted following the instructions in the provided template. This year, FDTC also encourages the submission of short papers which will also be subject to peer review; however, the intention is to encourage authors to introduce work in progress, novel applications, and corporate/industrial experiences. Short papers will be evaluated with a focus on novelty and potential for sparking the interest of the participants and future research avenues. Short paper submissions are limited to 6 pages formatted following the instructions in the provided template. The paper title for short papers must include the text "Short Paper:". Accepted submissions will be included in the conference proceedings. The submission of final papers will be managed directly by Conference Publishing Services (CPS). CPS will contact the authors with instructions and will send links for uploading the manuscripts. Accepted papers will be published in an archival proceedings volume by CPS and will be distributed at the time of the workshop. At least one author of each accepted paper must register for the workshop and present the paper in order to be included in the proceedings. Additional submission instructions and further information on the FDTC workshop series can be found at: http://fdtc-workshop.eu