Slides
Day 1
- Thomas Roche and Victor Lomné (NinjaLab), "A Side Journey to Titan"
- Guillaume Vilcocq, Lionel Rivière and Hugues Thiebeauld (eShard), "On the impact of SCA tools performance for IC Security"
- Dan Page, "Abstractions and tooling for leakage evaluation"
- Machine-Learning assisted Side-Channel Attacks on RNS-based ECC Implementations using Hybrid Feature Engineering. Naila Mukhtar (School of Engineering, Macquarie University, Australia), Louiza Papachristodoulou (Fontys University of Applied Sciences, The Netherlands), Apostolos P. Fournaris (Industrial Systems Institute/R.C. ATHENA, Greece), Lejla Batina (Radboud University Nijmegen, The Netherlands), Yinan Kong (School of Engineering, Macquarie University, Australia)
- Focus is Key to Success: A Focal Loss Function for Deep Learning-based Side-channel Analysis. Maikel Kerkhof (Delft University of Technology, The Netherlands) , Lichao Wu (Delft University of Technology, The Netherlands), Guilherme Perin (Delft University of Technology, The Netherlands), and Stjepan Picek (Radboud University & Delft University of Technology, The Netherlands)
- On the Evaluation of Deep Learning-based Side-channel Analysis. Lichao Wu (Delft University of Technology, The Netherlands), Guilherme Perin (Delft University of Technology, The Netherlands), and Stjepan Picek (Radboud University & Delft University of Technology, The Netherlands)
Day 2
- A Second Look at the ASCAD Databases. Maximilian Egger (Technical University of Munich), Thomas Schamberger (Technical University of Munich), Lars Tebelmann (Technical University of Munich), Florian Lippert (Technical University of Munich) and Georg Sigl (Technical University of Munich)
- FIPAC: Thwarting Fault- and Software-Induced Control-Flow Attacks with ARM Pointer Authentication. Robert Schilling (Graz University of Technology), Pascal Nasahl (Graz University of Technology), Stefan Mangard (Graz University of Technology, Lamarr Security Research)
- Body Biasing Injection: To thin or not to thin the substrate? Geoffrey Chancel (University of Montpellier, LIRMM), Jean-Marc Gallière (University of Montpellier, LIRMM) and Philippe Maurine (University of Montpellier, LIRMM)
- On the susceptibility of Texas Instruments SimpleLink platform microcontrollers to non-invasive physical attacks. Lennert Wouters (KU Leuven), Benedikt Gierlichs (KU Leuven) and Bart Preneel (KU Leuven)
- Single-trace clustering power analysis of the point-swapping procedure in the three point ladder of Cortex-M4 SIKE. Aymeric Genet (EPFL, Kudelski Group) and Novak Kaluđerović (EPFL)
- Canonical DPA attack on HMAC-SHA1/SHA2. Frank Schuhmacher (Segrids GmbH)
- Jiska Classen, "Repurposing Wireless Stacks for In-Depth Security Analysis"
- Provable Secure Software Masking in the Real-World. Arthur Beckers (KU Leuven), Lennert Wouters (KU Leuven), Benedikt Gierlichs (KU Leuven), Bart Preneel (KU Leuven) and Ingrid Verbauwhede (KU Leuven)
- Systematic Study of Decryption and Re-Encryption Leakage: the Case of Kyber. Melissa Azouaoui (NXP semiconductors, Germany), Olivier Bronchain (UCLouvain, ICTEAM/ELEN/Crypto Group, Belgium), Clément Hoffmann (UCLouvain, ICTEAM/ELEN/Crypto Group), Yulia Kuzovkova (NXP semiconductors, Germany), Tobias Schneider (NXP semiconductors, Austria), François-Xavier Standaert (UCLouvain, ICTEAM/ELEN/Crypto Group)
- Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations. Charles Momin (UCLouvain), Gaëtan Cassiers (UCLouvain), François-Xavier Standaert (UCLouvain)