Program
Sunday, August 25, 2019
8:00–9:30 | Welcome & Registration (until 6pm) - Chastain Foyer (6th floor) |
CHES Tutorials I, II and III (running in parallel) | |
9:30–12:30 |
Design of Secure Processor Architectures - Chastain D‐E Jakub Szefer (Yale University) |
9:30–12:30 |
Verification of Hardware IP Security and Trust - Chastain F‐G Prabhat Mishra (University of Florida) |
9:30–12:30 |
Safe and Secure Cyber-Physical and IoT Systems - Chastain I-J Marilyn Wolf (Georgia Tech) |
12:30–14:00 | Lunch - Augusta Room 1-3 (7th Floor) |
CHES Tutorials IV, V and VI (running in parallel) | |
14:00–17:00 |
Isogeny-Based Cryptography in Hardware - Chastain I‐J Reza Azarderaksh (Florida Atlantic University) |
14:00–17:00 |
Electromagnetic and Machine Learning Side-Channel Attacks and Low-overhead Generic Countermeasures - Chastain D‐E Shreyas Sen (Purdue University), Arijit Raychowdhury (Georgia Tech) |
14:00–17:00 |
Security of PUFs: Lessons Learned after Two Decades of Research (Video) - Chastain F‐G Fatemeh Ganji (University of Florida), Shahin Tajik (University of Florida) |
17:00–19:00 | Spare Time, registration continues from 6pm in Augusta Foyer |
19:00–21:00 | Welcome reception - Augusta Ballroom (7th Floor) |
Monday, August 26, 2019
8:00–8:30 | Welcome & registration (until 10pm) - Peachtree foyer (8th floor) |
8:30–8:40 | Opening remarks - Peachtree Ballroom |
Session 1: Lattices and post-quantum implementations (chair: Tanja Lange) | |
8:40–9:00 |
NTTRU: Truly Fast NTRU Using NTT Vadim Lyubashevsky, Gregor Seiler [slides] |
9:00–9:20 |
Implementing RLWE-based Schemes Using an RSA Co-Processor Martin R. Albrecht, Christian Hanser, Andrea Hoeller, Thomas Pöppelmann, Fernando Virdia, Andreas Wallner [slides] |
9:20–9:40 |
Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols Utsav Banerjee, Tenzin S. Ukyab, Anantha P. Chandrakasan [slides] |
9:40–10:10 | Break - Augusta Ballroom (7th floor) |
Session 2: Whitebox and Obfuscation (chair: Matthieu Rivain) | |
10:10–10:30 |
Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations Matthieu Rivain, Junwei Wang [slides] |
10:30–10:50 |
SMT Attack: Next Generation Attack on Obfuscated Circuits with Capabilities and Performance Beyond the SAT Attacks Kimia Zamiri Azar, Hadi Mardani Kamali, Houman Homayoun, Avesta Sasan [slides] |
10:50–11:10 |
Covert Gates: Protecting Integrated Circuits with Undetectable Camouflaging Bicky Shakya, Haoting Shen, Mark Tehranipoor, Domenic Forte [slides] |
11:10–11:40 | Break - Augusta Ballroom (7th floor) |
Invited talk 1 (chair: Jorge Guajardo) | |
11:40–12:30 |
RISCV and Security: how, when and why? Helena Handschuh |
12:30–14:00 | Lunch - Augusta Ballroom (7th floor) |
Session 3: PUFs (chair: Shahin Tajik) | |
14:00–14:20 |
The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Ulrich Rührmair, Marten van Dijk [slides] |
14:20–14:40 |
New Insights to Key Derivation for Tamper-Evident Physical Unclonable Functions Vincent Immler, Karthik Uppund [slides] |
14:40–15:00 |
Secure Physical Enclosures from Covers with Tamper-Resistance Vincent Immler, Johannes Obermaier, Kuan Kuan Ng, Fei Xiang Ke, JinYu Lee, Yak Peng Lim, Wei Koon Oh, Keng Hoong Wee, Georg Sigl [slides] |
15:00–15:30 | Break - Augusta Ballroom (7th floor) |
Session 4: Efficient Implementations (chair: Patrick Longa) | |
15:30–15:50 |
Fast, simple constant-time hashing to the BLS12-381 elliptic curve Riad S. Wahby, Dan Boneh [slides] |
15:50–16:10 |
Fast constant-time gcd computation and modular inversion Daniel J. Bernstein, Bo-Yin Yang [slides] |
16:10–16:30 |
New Circuit Minimization Techniques for Smaller, Faster AES SBoxes Alexander Maximov, Patrik Ekdahl [slides] |
16:30–16:50 |
Software Toolkit for HFE-based Multivariate Schemes Jean-Charles Faugère, Ludovic Perret, Jocelyn Ryckeghem [slides] |
16:50–17:20 | Break - Augusta Ballroom (7th floor) |
Session 5: EMA (chair: Benedikt Gierlichs) | |
17:20–17:40 |
Improving CEMA using Correlation Optimization Pieter Robyns, Peter Quax, Wim Lamotte [slides] |
17:40–18:00 |
Electromagnetic Information Extortion from Electronic Devices Using Interceptor, Its Countermeasure Masahiro Kinugawa, Daisuke Fujimoto, Yuichi Hayashi [slides] |
18:00–19:00 | Poster Session - Augusta Ballroom (7th floor) |
19:15–20:45 | Dinner - Peachtree Ballroom (8th floor) |
20:00–22:00 | Rump Session (chairs: Daniel Genkin and Peter Schwabe) - Peachtree Ballroom (8th floor) |
Tuesday, August 27, 2019
8:00–8:40 | Welcome & registration (until 4:10pm) - Peachtree Foyer (8th floor) |
Session 6: Hardware Masking (chair: Srinivas Vivek) | |
8:40–9:00 |
Consolidating Security Notions in Hardware Masking Lauren De Meyer, Begül Bilgin, Oscar Reparaz [slides] |
9:00–9:20 |
3-Share Threshold Implementation of AES S-box without Fresh Randomness Takeshi Sugawara [slides] |
9:20–9:40 |
Glitch-Resistant Masking Revisited – or Why Proofs in the Robust Probing Model are Needed Thorben Moos, Amir Moradi, Tobias Schneider, François-Xavier Standaert [slides] |
9:40–10:10 | Break - Augusta Ballroom (7th floor) |
Session 7: Public-Key Schemes (chair: Thomas Pöppelmann) | |
10:10–10:30 |
Return of the Hidden Number Problem – A Widespread and Novel Key Extraction Attack on ECDSA and DSA Keegan Ryan [slides] |
10:30–10:50 |
Practical Evaluation of Protected Residue Number System Scalar Multiplication Louiza Papachristodoulou, Apostolos P. Fournaris, Kostas Papagiannopoulos, Lejla Batina [slides] |
10:50–11:10 |
Error Amplification in Code-based Cryptography Alexander Nilsson, Thomas Johansson, Paul Stankovski Wagner [slides] |
11:10–11:40 | Break - Augusta Ballroom (7th floor) |
Invited talk 2 (chair: Pierre-Alain Fouque) | |
11:40–12:30 |
Developing High-Performance Mechanically-Verified Cryptographic Code Bryan Parno |
12:30–14:00 | Lunch - Augusta Ballroom (7th floor) |
Session 8: Leakage Analysis (chair: Amir Moradi) | |
14:00–14:20 |
Best Information is Most Successful – Mutual Information and Success Rate in Side-Channel Analysis Eloi de Chérisey, Sylvain Guilley, Olivier Rioul, Pablo Piantanida [slides] |
14:20–14:40 |
Multi-Tuple Leakage Detection and the Dependent Signal Issue Olivier Bronchain, Tobias Schneider, François-Xavier Standaert [slides] |
14:40–15:00 |
Leaky Noise: New Side-Channel Attack Vectors in Mixed-Signal IoT Devices Dennis R. E. Gnad, Jonas Krautter, Mehdi B. Tahoori [slides] |
15:00–15:30 | Break - Augusta Ballroom (7th floor) |
Session 9: System Attacks (chair: Elke de Mulder) | |
15:30–15:50 |
Fast, Furious and Insecure: Passive Keyless Entry and Start Systems in Modern Supercars Lennert Wouters, Eduard Marin, Tomer Ashur, Benedikt Gierlichs, Bart Preneel [slides] |
15:50–16:10 |
Security on Plastics: Fake or Real? Nele Mentens, Jan Genoe, Thomas Vandenabeele, Lynn Verschueren, Dirk Smets, Wim Dehaene, Kris Myny [slides] |
16:10–19:00 | MLK Outing |
19:00– | Conference Banquet - Sundial Restaurant (top floors of Westin) |
Wednesday, August 28, 2019
8:00–8:40 | Welcome & registration - Southern Exchange Hallway (access from 6th floor) |
Session 10: Power Analysis (chair: Nele Mentens) - Southern Exchange Davidson | |
8:40–9:00 |
On-Device Power Analysis Across Hardware Security Domains Colin O'Flynn, Alex Dewar [slides] |
9:00–9:20 |
Exploring the Effect of Device Aging on Static Power Analysis Attacks Naghmeh Karimi, Thorben Moos, Amir Moradi [slides] |
9:20–9:40 |
Static Power SCA of Sub-100 nm CMOS ASICs and the Insecurity of Masking Schemes in Low-Noise Environments Thorben Moos [slides] |
9:40–10:10 | Break - Southern Exchange White Hall |
Session 11: Masking Security and Efficiency (chair: Martijn Stam) | |
10:10–10:30 |
Reducing a Masked Implementation’s Effective Security Order with Setup Manipulations – And an Explanation Based on Externally-Amplified Couplings Itamar Levi, Davide Bellizia, François-Xavier Standaert [slides] |
10:30–10:50 |
Towards Globally Optimized Masking: From Low Randomness to Low Noise Rate – or Probe Isolating Multiplications with Reduced Randomness and Security against Horizontal Attacks Gaëtan Cassiers, François-Xavier Standaert [slides] |
10:50–11:10 |
M&M: Masks and Macs against Physical Attacks Lauren De Meyer, Victor Arribas, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen [slides] |
11:10–11:40 | Break - Southern Exchange White Hall |
Session 12: Novel Attacks (chair: Guido Bertoni) | |
11:40–12:00 |
Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers Xiaolu Hou, Jakub Breier, Fuyuan Zhang, Yang Liu [slides] |
12:00–12:20 |
Shaping the Glitch: Optimizing Voltage Fault Injection Attacks Claudio Bozzato, Riccardo Focardi, Francesco Palmarini [slides] |
12:20–12:40 |
Novel Side-Channel Attacks on Quasi-Cyclic Code-Based Cryptography Bo-Yeon Sim, Jihoon Kwon, Kyu Young Choi, Jihoon Cho, Aesun Park, Dong-Guk Han [slides] |
12:40–14:00 | Lunch - Southern Exchange White Hall |
Session 13: Cloud and IoT Security (chair: Francesco Regazzoni) | |
14:00–14:20 |
Cache-Timing Attacks on RSA Key Generation Alejandro Cabrera Aldaya, Cesar Pereida García, Luis Manuel Alvarez Tapia, Billy Bob Brumley [slides] |
14:20–14:40 |
AuCPace: Efficient verifier-based PAKE protocol tailored for the IIoT Björn Haase, Benoît Labrique [slides] |
14:40–15:00 |
Secure Data Retrieval on the Cloud: Homomorphic Encryption meets Coresets Adi Akavia, Dan Feldman, Hayim Shaul [slides] |
15:00–15:30 | Break - Southern Exchange White Hall |
Session 14: Machine Learning (chair: Fatemeh Ganji) | |
15:30–15:50 |
Make Some Noise. Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis Jaehun Kim, Stjepan Picek, Annelie Heuser, Shivam Bhasin, Alan Hanjalic [slides] |
15:50–16:10 |
The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations Stjepan Picek, Annelie Heuser, Alan Jovic, Shivam Bhasin, Francesco Regazzoni [slides] |
16:10–16:30 |
Non-Profiled Deep Learning-based Side-Channel attacks with Sensitivity Analysis Benjamin Timon [slides] |
16:30–16:50 |
Deep Learning to Evaluate Secure RSA Implementations Mathieu Carbone, Vincent Conin, Marie-Angela Cornélie, François Dassance, Guillaume Dufresne, Cécile Dumas, Emmanuel Prouff, Alexandre Venelli [slides] |
16:50–17:00 | Adjourn |