ABSTRACT
In this workshop, we focus on physical attacks and their countermeasures. With the advent of the Internet of Things, the interest in embedded cryptographic systems and physical attacks on these systems is steadily increasing, both in academia and industry. Sophisticated security certification and evaluation methods have been established to give assurance about the security claims by independent evaluation and testing. The certification has a drawback that it is time consuming and expensive. There is a need for further developing provably secure protection methods and automated verification tools, but also improving the efficiency and quality of certification by integrating these tools and methods. All these challenges motivate even more research on the Theory of Implementation Security.
- P.C. Kocher. 1996. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In Advances in Cryptology - CRYPTO 1996, Lecture Notes in Computer Science 1109, Springer-Verlag, pp. 104--113.Google ScholarCross Ref
- P C. Kocher, J. Jaffe, B. Jun, 1999. Differential Power Analysis. In Advances in Cryptology - CRYPTO 1999, Lecture Notes in Computer Science 1666, Springer-Verlag, pp. 388--397.Google ScholarCross Ref
- K. Gandolfi, C. Mourtel, F. Olivier. 2001. Electromagnetic Analysis: Concrete Results, In Cryptographic Hardware and Embedded Systems - CHES 2001, Lecture Notes in Computer Science 2162, Springer-Verlag, pp. 251--261.Google Scholar
- H. Bar-El, H. Choukri, D. Naccache, M. Tunstall, C. Whelan. 2006. The Sorcerer's Apprentice Guide to Fault Attacks. In Proceedings of the IEEE 94(2), pp. 370--382.Google ScholarCross Ref
- S. Skorobogatov. 2003. Optical Fault Induction Attacks. In Cryptographic Hardware and Embedded Systems - CHES 2002, Lecture Notes in Computer Science 2523, Springer-Verlag, pp. 2--12.Google Scholar
- J.-J. Quisquater, D. Samyde. 2002. Eddy Current for Magnetic Analysis with Active Sensor. In E-Smart 2002, pp. 185--194.Google Scholar
Index Terms
- TIS'19: Theory of Implementation Security Workshop 2019
Recommendations
Theory of Implementation Security Workshop (TIs 2016)
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityThe Internet of Things (IoT) enables a network of communication between people-to-people, people-to-things and things-to-things. The security of these communications against all possible attacks is a significant part of todays security and privacy. Due ...
Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order
TIS '16: Proceedings of the 2016 ACM Workshop on Theory of Implementation SecurityPassive physical attacks, like power analysis, pose a serious threat to the security of embedded systems and corresponding countermeasures need to be implemented. In this talk, we demonstrate how the costs for protecting digital circuits against passive ...
Solving Internet's Weak Link for Blockchain and IoT Applications
SCC '18: Proceedings of the 1st ACM/EIGSCC Symposium on Smart Cities and CommunitiesBlockchain normalizes applications that run on the internet through the standardization of decentralized data structure, computational requirements and trust in transactions. This new standard has now spawned hundreds of legitimate internet applications ...
Comments