Preliminary Program
Wednesday, April 3
9:00-16:00 Hands-on course: Evaluating Security during Software and Hardware Cryptography Design – Use Cases
Offered by Secure-IC.
Separate registration and payment is required - please use the link
http://www.secure-ic.com/one-day-tutorial-03-04-2019-darmstadt-co-located-with-cosade/
Course content: Learn advanced analysis methods with Secure-IC experts,
using AnalyzrTM, VirtualyzrTM and CatalyzrTM tools.
17:00 Welcome reception in the Hessisches Landesmuseum Darmstadt, including a museum tour.
Thursday, April 4
Conference at Darmstadtium
9:00 | Opening and Welcome AddressStefan Katzenbeisser (TU Darmstadt, DE), Ilia Polian (University of Stuttgart, DE), Marc Stöttinger (Continental AG, DE) |
9:30 | KeynoteOnur Mutlu, ETH Zurich |
10:30 | KeynoteRamesh Karri, New York University |
11:30 |
Coffee Break |
12:00 |
Session 1: Side-Channel Attacks |
12:00 |
Fast Side-Channel Security Evaluation of ECC Implementations – Shortcut Formulas for Horizontal
Side-channel Attacks against ECSM with the Montgomery ladder |
12:30 |
Side-Channel Analysis of the TERO PUF |
13:00 | Lunch |
14:30 |
Session 2: Fault-Injection Attacks |
14:30 |
FIMA: Fault Intensity Map Analysis |
15:00 |
Differential Fault Attacks on KLEIN |
15:30 | Coffee Break |
16:00 |
Session 3: Whitebox Attacks |
16:00 |
Another Look on Bucketing Attack to Defeat White-Box Implementations |
16:30 |
Higher-Order DCA against Standard Side-Channel Countermeasures |
17:00 | Break |
18:30 |
Social Event – 10 Years of COSADEModeration: Jean-Luc Danger (Telecom Paris, FR) and Werner Schindler (BSI, DE)
|
Friday, April 5
Conference at Darmstadtium
09:00 |
Invited Talk
Sylvain Guilley, Secure IC |
9:30 |
Session 4: Side Channel Analysis Methodologies |
9:30 |
Gradient Visualization for General Characterization in Profiling Attacks |
10:00 |
Fast Analytical Rank Estimation |
10:30 | Coffee Break |
11:00 |
Session 5: Security Aspects of Post-Quantum Schemes |
11:00 |
Fault Attacks on UOV and Rainbow |
11:30 |
Towards Optimized and Constant-Time CSIDH on Embedded Devices |
12:00 |
Number "Not Used" Once - Practical fault attack on pqm4 implementations of NIST candidates |
12:30 | Lunch |
14:00 |
Session 6: Countermeasures Against Implementation Attacks |
14:00 |
Practical Evaluation of Masking for NTRUEncrypt on ARM Cortex-M4 |
14:30 |
Shuffle and Mix: On the Diffusion of Randomness in Threshold Implementations of Keccak |
15:00 |
Trade-offs in Protecting Keccak against Combined Side-channel and Fault Attacks |
15:30 |
Closing and Farewell; Announcement of COSADE 2020 |