skip to main content
10.1145/3319535.3353552acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
abstract

TIS'19: Theory of Implementation Security Workshop 2019

Published:06 November 2019Publication History

ABSTRACT

In this workshop, we focus on physical attacks and their countermeasures. With the advent of the Internet of Things, the interest in embedded cryptographic systems and physical attacks on these systems is steadily increasing, both in academia and industry. Sophisticated security certification and evaluation methods have been established to give assurance about the security claims by independent evaluation and testing. The certification has a drawback that it is time consuming and expensive. There is a need for further developing provably secure protection methods and automated verification tools, but also improving the efficiency and quality of certification by integrating these tools and methods. All these challenges motivate even more research on the Theory of Implementation Security.

References

  1. P.C. Kocher. 1996. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In Advances in Cryptology - CRYPTO 1996, Lecture Notes in Computer Science 1109, Springer-Verlag, pp. 104--113.Google ScholarGoogle ScholarCross RefCross Ref
  2. P C. Kocher, J. Jaffe, B. Jun, 1999. Differential Power Analysis. In Advances in Cryptology - CRYPTO 1999, Lecture Notes in Computer Science 1666, Springer-Verlag, pp. 388--397.Google ScholarGoogle ScholarCross RefCross Ref
  3. K. Gandolfi, C. Mourtel, F. Olivier. 2001. Electromagnetic Analysis: Concrete Results, In Cryptographic Hardware and Embedded Systems - CHES 2001, Lecture Notes in Computer Science 2162, Springer-Verlag, pp. 251--261.Google ScholarGoogle Scholar
  4. H. Bar-El, H. Choukri, D. Naccache, M. Tunstall, C. Whelan. 2006. The Sorcerer's Apprentice Guide to Fault Attacks. In Proceedings of the IEEE 94(2), pp. 370--382.Google ScholarGoogle ScholarCross RefCross Ref
  5. S. Skorobogatov. 2003. Optical Fault Induction Attacks. In Cryptographic Hardware and Embedded Systems - CHES 2002, Lecture Notes in Computer Science 2523, Springer-Verlag, pp. 2--12.Google ScholarGoogle Scholar
  6. J.-J. Quisquater, D. Samyde. 2002. Eddy Current for Magnetic Analysis with Active Sensor. In E-Smart 2002, pp. 185--194.Google ScholarGoogle Scholar

Index Terms

  1. TIS'19: Theory of Implementation Security Workshop 2019

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
      November 2019
      2755 pages
      ISBN:9781450367479
      DOI:10.1145/3319535

      Copyright © 2019 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 6 November 2019

      Check for updates

      Qualifiers

      • abstract

      Acceptance Rates

      CCS '19 Paper Acceptance Rate149of934submissions,16%Overall Acceptance Rate1,261of6,999submissions,18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA
    • Article Metrics

      • Downloads (Last 12 months)7
      • Downloads (Last 6 weeks)2

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader