skip to main content
10.1145/3560834acmconferencesBook PagePublication PagesccsConference Proceedingsconference-collections
ASHES'22: Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security
ACM2022 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security Los Angeles CA USA 11 November 2022
ISBN:
978-1-4503-9884-8
Published:
07 November 2022
Sponsors:
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN
Next Conference
October 13 - 17, 2025
Taipei , Taiwan
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the Sixth Workshop on Attacks and Solutions in Hardware Security 2022 (ASHES 2022), a post-conference satellite workshop of the ACM Conference on Computer and Communications Security 2022 (CCS 2022). Due to the ongoing pandemic and to provide greater flexibility for attendees in areas where travel was still inconvenient, ASHES was held in hybrid mode this year.

ASHES deals with all theoretical and practical aspects of hardware security and welcomes any contributions to this area. Besides being a mainstream platform for disseminating fundamental research on hardware security, the workshop encourages and promotes emerging and new ideas. It includes topics like physical attacks on electronic circuits, secure hardware designs to counter such attacks, lightweight secure designs, post-quantum cryptographic circuits, or emerging topics at the intersection of nanotechnology and hardware security, such as physically unclonable functions (PUFs). The workshop also focusses on recent applications like the internet of things, automotive security, smart homes, or pervasive and wearable computing. ASHES thereby aims at giving researchers and practitioners a unique opportunity to mutually share their perspectives with each other.

Skip Table Of Content Section
SESSION: Keynote Talks
keynote
Towards Remote Verifiable Computation without Digital Secrets

The development of secure processor architecture technology has seen many challenges. It turns out difficult to implement efficient resource sharing and at the same time eliminate or protect against side channels as a result of shared caches and other ...

keynote
Automating Cryptographic Code Generation

Cryptography provides the data protection mechanisms that underly security and privacy in the modern connected world. Given this pivotal role, implementations of cryptographic code must not only be correct, but also meet stringent performance and ...

SESSION: Workshop Full Papers
research-article
Leveraging Layout-based Effects for Locking Analog ICs

While various obfuscation methods exist in the digital domain, techniques for protecting Intellectual Property (IP) in the analog domain are mostly overlooked. Understandably, analog components have a small footprint as most of the surface of an ...

research-article
SpecDefender: Transient Execution Attack Defender using Performance Counters

Side-channel attacks based on speculative execution have gained enough traction for researchers. This has resulted in the development of more creative variants of Spectre and its defences. However, many of these defence strategies end up making ...

research-article
Differential Fault Attack on PHOTON-Beetle

In this paper, we report the first differential fault attack (DFA) on nonce-based AE scheme PHOTON-BEETLE, which is one of the finalists in the ongoing NIST LwC competition. In general, it is a challenging task to perform DFA for any nonce-based sponge ...

research-article
Open Access
Secure FMCW LiDAR Systems with Frequency Encryption

Robust and secure ranging is among the most vital capabilities demanded by future autonomous vehicles and robotics for precise navigation and avoiding collisions. Light detection and ranging (LiDAR) is a promising 3D imaging technology for this aim. ...

research-article
Breaking KASLR on Mobile Devices without Any Use of Cache Memory

Microarchitectural attacks utilize the performance optimization constructs that have been studied over decades in computer architecture research and show the vulnerability of such optimizations in a realistic framework. One such highly performance ...

research-article
On-Chip Side-Channel Analysis of the Loop PUF

In recent years, Side-Channel Analysis (SCA) that leverages power measurements from peripherals or on-chip power sensors has gained increasing attention. Instead of direct physical access to the victim device, these so-called remote SCA attacks can be ...

research-article
Putting IMT to the Test: Revisiting and Expanding Interval Matching Techniques and their Calibration for SCA

Side-Channel Analysis (SCA) requires the detection of the specific time frame Cryptographic Operations (COs) take place in the side-channel signal. Under laboratory conditions with full control over the Device under Test (DuT), dedicated trigger signals ...

research-article
Injecting Permanent Faults into the Flash Memory of a Microcontroller with Laser Illumination During Read Operations

Microcontrollers embed an integrated Flash memory which has been proven to be vulnerable to certain hardware attacks. The Flash memory stores the microcontroller unit (MCU) firmware and, eventually, security related data such as passwords and ...

research-article
Open Access
To Be, or Not to Be Stateful: Post-Quantum Secure Boot using Hash-Based Signatures

While research in post-quantum cryptography (PQC) has gained significant momentum, it is only slowly adopted for real-world products. This is largely due to concerns about practicability and maturity. The secure boot process of embedded devices is one ...

SESSION: Workshop Short Papers
short-paper
Public Access
Exposing Side-Channel Leakage of SEAL Homomorphic Encryption Library

This paper reveals a new side-channel leakage of Microsoft SEAL homomorphic encryption library. The proposed attack exploits the leakage of ternary value assignments made during the Number Theoretic Transform (NTT) sub-routine. Notably, the attack can ...

short-paper
Public Access
PR Crisis: Analyzing and Fixing Partial Reconfiguration in Multi-Tenant Cloud FPGAs

FPGAs are increasingly being used in cloud systems, mainly due to their performance and energy advantages. Recent FPGAs have a relatively large amount of resources, which enables multi-tenancy and hence improves the utilization and economic value for ...

Contributors
  • Nanyang Technological University
  • Technical University of Berlin
  • School of Computer Science and Engineering
  • University of Florida

Recommendations

Acceptance Rates

Overall Acceptance Rate 6 of 20 submissions, 30%
YearSubmittedAcceptedRate
ASHES '1720630%
Overall20630%