- Sponsor:
- sigsac
It is our great pleasure to welcome you to the Fourth Workshop on Attacks and Solutions in Hardware Security 2020 (ASHES 2020), a post-conference satellite workshop of the ACM Conference on Computer and Communications Security 2020 (CCS 2020). For the first time, ASHES was held completely virtual.
ASHES deals with all aspects of hardware security, and welcomes any contributions to this area. Besides being a forum for mainstream hardware security research, its mission is to specifically foster new concepts, solutions, and methodological approaches, and to promote new application scenarios. This includes, for example, new attack vectors on secure hardware, the merger of nanotechnology and hardware security, novel designs and materials, lightweight security hardware, and physical unclonable functions (PUFs) on the methodological side, as well as the internet of things, automotive security, smart homes, supply chain security, pervasive and wearable computing on the applications side. ASHES thereby aims at giving researchers and practitioners a unique opportunity to share their perspectives with others on various emerging aspects of hardware security research.
Proceeding Downloads
The Pursuit of Happiness: Establishing Hardware Root-of-Trust for Cyber Security
Design, fabrication, assembly, test, and debug of integrated circuits and systems have become distributed across the globe, raising major concerns about their security and trustworthiness. Such systems are prevalent is many critical-mission ...
Formidable Challenges in Hardware Implementations of Fully Homomorphic Encryption Functions for Applications in Machine Learning
The concept of homomorphic encryption was introduced almost exactly same time as the first public-key cryptographic algorithm RSA, which was multiplicatively homomorphic. Encryption functions with additive and multiplicative homomorphisms allow us (at ...
SoK: Towards Secret-Free Security
Digital secret keys are indispensable in modern cryptography and computer security - but at the same time constitute a routinely exploited attack target in every hardware system that stores them. This discrepancy has created perpetual battle between key ...
Erasable PUFs: Formal Treatment and Generic Design
Physical Unclonable Functions (PUFs) have not only been suggested as new key storage mechanism, but --- in the form of so-called "Strong PUFs'' --- also as cryptographic primitives in advanced schemes, including key exchange, oblivious transfer, or ...
Far Field EM Side-Channel Attack on AES Using Deep Learning
We present the first deep learning-based side-channel attack on AES-128 using far field electromagnetic emissions as a side channel. Our neural networks are trained on traces captured from five different Bluetooth devices at five different distances to ...
Lightweight Implementation of the LowMC Block Cipher Protected Against Side-Channel Attacks
LowMC is a parameterizable block cipher developed for use in Multi-Party Computation (MPC) and Fully Homomorphic Encryption (FHE). In these applications, linear operations are much less expensive in terms of resource utilization compared to the non-...
Exploring Effect of Residual Electric Charges on Cryptographic Circuits
Building leakage models is important in designing countermeasures against side-channel attacks (SCAs), and Hamming-weight/distance (HW/HD) models are traditional leakage models. Electromagnetic analysis (EMA) attacks using a tiny EM probe are the most ...
Differential Fault Analysis of NORX
In recent literature, there has been a particular interest in studying nonce-based Authenticated Encryption (AE) schemes in the light of fault-based attacks as they seem to present automatic protection against Differential Fault Attacks (DFA). In this ...
PRINCE under Differential Fault Attack: Now in 3D
Fault analysis is one of the most studied physical attacks primarily due to the inherent ease of implementation. This work investigates integral and differential fault analysis attacks on the well-known lightweight block-cipher PRINCE. The work begins ...
Building a Modern TRNG: An Entropy Source Interface for RISC-V
The currently proposed RISC-V True Random Number Generator (TRNG) architecture breaks with previous ISA TRNG practice by splitting the Entropy Source (ES) component away from cryptographic PRNGs into a separate interface, and in its use of polling. We ...
SoK: Physical and Logic Testing Techniques for Hardware Trojan Detection
Hardware Trojans have emerged as great threat to the trustability of modern electronic systems. A deployed electronic system with one or more undetected Hardware Trojan-infected components can cause grave harm, ranging from personal information loss to ...
SpectreRewind: Leaking Secrets to Past Instructions
Transient execution attacks use microarchitectural covert channels to leak secrets that should not have been accessible during logical program execution. Commonly used micro-architectural covert channels are those that leave lasting footprints in the ...
WaC: A New Doctrine for Hardware Security
In this paper, we promote the idea that recent woes in hardware security are not because of a lack of technical solutions but rather because market forces and incentives prevent those with the ability to fix problems from doing so. At the root of the ...
- Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
ASHES '17 | 20 | 6 | 30% |
Overall | 20 | 6 | 30% |