- Sponsor:
- sigsac
It is our great pleasure to welcome you to the Sixth Workshop on Attacks and Solutions in Hardware Security 2022 (ASHES 2022), a post-conference satellite workshop of the ACM Conference on Computer and Communications Security 2022 (CCS 2022). Due to the ongoing pandemic and to provide greater flexibility for attendees in areas where travel was still inconvenient, ASHES was held in hybrid mode this year.
ASHES deals with all theoretical and practical aspects of hardware security and welcomes any contributions to this area. Besides being a mainstream platform for disseminating fundamental research on hardware security, the workshop encourages and promotes emerging and new ideas. It includes topics like physical attacks on electronic circuits, secure hardware designs to counter such attacks, lightweight secure designs, post-quantum cryptographic circuits, or emerging topics at the intersection of nanotechnology and hardware security, such as physically unclonable functions (PUFs). The workshop also focusses on recent applications like the internet of things, automotive security, smart homes, or pervasive and wearable computing. ASHES thereby aims at giving researchers and practitioners a unique opportunity to mutually share their perspectives with each other.
Proceeding Downloads
Towards Remote Verifiable Computation without Digital Secrets
The development of secure processor architecture technology has seen many challenges. It turns out difficult to implement efficient resource sharing and at the same time eliminate or protect against side channels as a result of shared caches and other ...
Automating Cryptographic Code Generation
Cryptography provides the data protection mechanisms that underly security and privacy in the modern connected world. Given this pivotal role, implementations of cryptographic code must not only be correct, but also meet stringent performance and ...
Leveraging Layout-based Effects for Locking Analog ICs
While various obfuscation methods exist in the digital domain, techniques for protecting Intellectual Property (IP) in the analog domain are mostly overlooked. Understandably, analog components have a small footprint as most of the surface of an ...
SpecDefender: Transient Execution Attack Defender using Performance Counters
Side-channel attacks based on speculative execution have gained enough traction for researchers. This has resulted in the development of more creative variants of Spectre and its defences. However, many of these defence strategies end up making ...
Differential Fault Attack on PHOTON-Beetle
In this paper, we report the first differential fault attack (DFA) on nonce-based AE scheme PHOTON-BEETLE, which is one of the finalists in the ongoing NIST LwC competition. In general, it is a challenging task to perform DFA for any nonce-based sponge ...
Secure FMCW LiDAR Systems with Frequency Encryption
Robust and secure ranging is among the most vital capabilities demanded by future autonomous vehicles and robotics for precise navigation and avoiding collisions. Light detection and ranging (LiDAR) is a promising 3D imaging technology for this aim. ...
Breaking KASLR on Mobile Devices without Any Use of Cache Memory
Microarchitectural attacks utilize the performance optimization constructs that have been studied over decades in computer architecture research and show the vulnerability of such optimizations in a realistic framework. One such highly performance ...
On-Chip Side-Channel Analysis of the Loop PUF
In recent years, Side-Channel Analysis (SCA) that leverages power measurements from peripherals or on-chip power sensors has gained increasing attention. Instead of direct physical access to the victim device, these so-called remote SCA attacks can be ...
Putting IMT to the Test: Revisiting and Expanding Interval Matching Techniques and their Calibration for SCA
Side-Channel Analysis (SCA) requires the detection of the specific time frame Cryptographic Operations (COs) take place in the side-channel signal. Under laboratory conditions with full control over the Device under Test (DuT), dedicated trigger signals ...
Injecting Permanent Faults into the Flash Memory of a Microcontroller with Laser Illumination During Read Operations
Microcontrollers embed an integrated Flash memory which has been proven to be vulnerable to certain hardware attacks. The Flash memory stores the microcontroller unit (MCU) firmware and, eventually, security related data such as passwords and ...
To Be, or Not to Be Stateful: Post-Quantum Secure Boot using Hash-Based Signatures
While research in post-quantum cryptography (PQC) has gained significant momentum, it is only slowly adopted for real-world products. This is largely due to concerns about practicability and maturity. The secure boot process of embedded devices is one ...
Exposing Side-Channel Leakage of SEAL Homomorphic Encryption Library
This paper reveals a new side-channel leakage of Microsoft SEAL homomorphic encryption library. The proposed attack exploits the leakage of ternary value assignments made during the Number Theoretic Transform (NTT) sub-routine. Notably, the attack can ...
PR Crisis: Analyzing and Fixing Partial Reconfiguration in Multi-Tenant Cloud FPGAs
FPGAs are increasingly being used in cloud systems, mainly due to their performance and energy advantages. Recent FPGAs have a relatively large amount of resources, which enables multi-tenancy and hence improves the utilization and economic value for ...
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
ASHES '17 | 20 | 6 | 30% |
Overall | 20 | 6 | 30% |