Program
Sunday, April 10
18:00 - 20:00 | Social event - Brewery tour and beer tastingWe will meet at 17:45 at the corner of Eikstraat and Jozef Vounckplein, in front of the entrance of Domus brewery, for the tour. Afterwards we go to Domus restaurant for the beer tasting. If you are not able to join us for the tour, please feel welcome to join us later (say from 19:00 onward) in the restaurant. We will probably stay there longer than 20:00 :-) |
Monday, April 11
Conference at Aula Zeger Van Hee in Leuven
10:00 - 11:00 | Registration / Coffee |
11:00 - 11:15 | Opening / Welcome |
11:15 - 12:30 |
Industry SessionThomas Roche and Victor Lomné (NinjaLab), "A Side Journey to Titan" Guillaume Vilcocq, Lionel Rivière and Hugues Thiebeauld (eShard), "On the impact of SCA tools performance for IC Security" |
12:30 - 14:00 | Lunch |
14:00 - 15:00 |
Invited talkSession chair: Josep BalaschDan Page, "Abstractions and tooling for leakage evaluation" |
15:00 - 15:30 | Coffee Break |
15:30 - 16:45 |
Session 1: Machine / Deep learningSession chair: Lennert WoutersMachine-Learning assisted Side-Channel Attacks on RNS-based ECC Implementations using Hybrid Feature Engineering. Naila Mukhtar (School of Engineering, Macquarie University, Australia), Louiza Papachristodoulou (Fontys University of Applied Sciences, The Netherlands), Apostolos P. Fournaris (Industrial Systems Institute/R.C. ATHENA, Greece), Lejla Batina (Radboud University Nijmegen, The Netherlands), Yinan Kong (School of Engineering, Macquarie University, Australia) Focus is Key to Success: A Focal Loss Function for Deep Learning-based Side-channel Analysis. Maikel Kerkhof (Delft University of Technology, The Netherlands) , Lichao Wu (Delft University of Technology, The Netherlands) , Guilherme Perin (Delft University of Technology, The Netherlands), and Stjepan Picek (Radboud University & Delft University of Technology, The Netherlands) On the Evaluation of Deep Learning-based Side-channel Analysis. Lichao Wu (Delft University of Technology, The Netherlands), Guilherme Perin (Delft University of Technology, The Netherlands), and Stjepan Picek (Radboud University & Delft University of Technology, The Netherlands) |
18:00 - 19:00 | Reception |
19:00 - 22:00 | Banquet |
Tuesday, April 12
Conference at Aula Zeger Van Hee in Leuven
09:00 - 10:15 |
Session 2: Tools & ReferencesSession chair: Francesco RegazzoniA Second Look at the ASCAD Databases. Maximilian Egger (Technical University of Munich), Thomas Schamberger (Technical University of Munich), Lars Tebelmann (Technical University of Munich), Florian Lippert (Technical University of Munich) and Georg Sigl (Technical University of Munich) FIPAC: Thwarting Fault- and Software-Induced Control-Flow Attacks with ARM Pointer Authentication. Robert Schilling (Graz University of Technology), Pascal Nasahl (Graz University of Technology), Stefan Mangard (Graz University of Technology, Lamarr Security Research) Body Biasing Injection: To thin or not to thin the substrate? Geoffrey Chancel (University of Montpellier, LIRMM), Jean-Marc Gallière (University of Montpellier, LIRMM) and Philippe Maurine (University of Montpellier, LIRMM) |
10:15 - 10:45 | Coffee Break |
10:45 - 12:00 |
Session 3: AttacksSession chair: Olivier BronchainOn the susceptibility of Texas Instruments SimpleLink platform microcontrollers to non-invasive physical attacks. Lennert Wouters (KU Leuven), Benedikt Gierlichs (KU Leuven) and Bart Preneel (KU Leuven) Single-trace clustering power analysis of the point-swapping procedure in the three point ladder of Cortex-M4 SIKE. Aymeric Genet (EPFL, Kudelski Group) and Novak Kaluđerović (EPFL) Canonical DPA attack on HMAC-SHA1/SHA2. Frank Schuhmacher (Segrids GmbH) |
12:00 - 13:30 | Lunch |
13:30 - 14:30 |
Invited talkJiska Classen, "Repurposing Wireless Stacks for In-Depth Security Analysis" Session chair: Colin O'Flynn |
14:30 - 15:00 | Coffee Break |
15:00 - 16:15 |
Session 4: MaskingSession chair: Amir MoradiProvable Secure Software Masking in the Real-World. Arthur Beckers (KU Leuven), Lennert Wouters (KU Leuven), Benedikt Gierlichs (KU Leuven), Bart Preneel (KU Leuven) and Ingrid Verbauwhede (KU Leuven) Systematic Study of Decryption and Re-Encryption Leakage: the Case of Kyber. Melissa Azouaoui (NXP semiconductors, Germany), Olivier Bronchain (UCLouvain, ICTEAM/ELEN/Crypto Group, Belgium), Clément Hoffmann (UCLouvain, ICTEAM/ELEN/Crypto Group), Yulia Kuzovkova (NXP semiconductors, Germany), Tobias Schneider (NXP semiconductors, Austria), François-Xavier Standaert (UCLouvain, ICTEAM/ELEN/Crypto Group) Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations. Charles Momin (UCLouvain), Gaëtan Cassiers (UCLouvain), François-Xavier Standaert (UCLouvain) |
16:15 - 16:20 |
Farewell |