|
|
Welcome and Opening remarks |
|
Keynote I
|
|
|
Persistent Fault Analysis: The Persistent Threat
Shivam Bhasin
|
|
Session 1 – FAULT ATTACKS ON SW AND HW DEVICES
|
|
A single-trace fault injection attack on hedged module lattice digital signature algorithm (ML-DSA)
Sönke Jendral, John Preuß Mattsson and Elena Dubrova |
|
Fault injection attacks exploiting high voltage pulsing over Si-substrate backside of IC chips
Yusuke Hayashi, Rikuu Hasegawa, Takuya Wadatsumi, Kazuki Monta, Takuji Miki and Makoto Nagata |
|
Improving CPU fault injection simulations: insights from RTL to instruction-level models
Jasper van Woudenberg, Rajesh Velegalati, Cees-Bart Breunesse and Dennis Vermoen |
|
Keynote II
|
|
|
Fault Tolerance of Encrypted Memory: Crash Consistency Problem and Secure Recovery
Rei Ueno
|
|
Session 2 – FAULT ATTACK MODELS AND COUNTERMEASURE (short papers)
|
|
Switch-glitch - location of fault injection sweet spots by electromagnetic emanation
Matthias Probst, Michael Gruber, Manuel Brosch, Tim Music and Georg Sigl |
|
MAYo or MAY-not: exploring implementation security of the post-quantum signature scheme MAYO against physical attacks
Thomas Aulbach, Soundes Marzougui, Vincent Quentin Ulitzsch and Jean-Pierre Seifert |
|
Session 3 – Fault Injection Analysis and Tools
|
|
FaultyGarble: fault attack on secure multiparty neural network inference
Mohammad Hashemi, Dev Mehta, Kyle Mitard, Shahin Tajik and Fatemeh Ganji |
|
PoP DRAM: a new EMFI approach based on EM-induced glitches on SoC
Clément Fanjas, Simon Pontié, Driss Aboulkassimi and Jessy Clédierè |
|
|
Closing remarks and Farewell |
|