•  

    Theory of Implementation Security

    November 11, 2019 London

     

  • Lock

    Theory of Implementation Security (TIs) Workshop

    The traditional application of cryptography is the protection of communication lines. It is usually assumed that both sender and receiver have equipment that is protected by physical means against attacks. In modern applications like payment cards, set-top boxes, DRM protection, etc., this assumption is no longer true. The attacker often has physical access to the device that is executing the cryptographic algorithm, and can measure side channels: execution time, power consumption, electro-magnetic radiation. With the advent of the Internet of Things, the interest in embedded cryptographic systems and physical attacks on these systems is steadily increasing, both in academia and industry. On the other hand, sophisticated security certification and evaluation methods (FIPS, CC, etc.) have been established to give assurance about the security claims by independent evaluation and testing. The drawback is that certification is time consuming, expensive and sometimes the results are not repeatable. There is an emerging need from one side for further developing provably secure protection methods and automated verification tools and from another side improving the efficiency and quality of certification by integrating these tools and methods which will allow assessment of the physical attacks’ resilience of the implementations with low cost and reduced time. All these challenges motivate even more research on the Theory of Implementation Security.

    The workshop seeks submissions from the academia and the public/private sectors presenting novel research results on the following topics of interest:

    • Physical attacks and countermeasures
    • Secure and efficient implementations of cryptographic algorithms
    • Designs of cryptographic algorithms with physical attack resistance
    • Verification and evaluation tools

    Submitted papers must be original, unpublished, anonymous and not submitted to journals or other conferences/workshops that have proceedings. Submissions must be written in English and should be at most 12 pages in double-column ACM format. Papers not meeting these guidelines risk rejection without consideration. All submitted papers will be reviewed by at least three members of the program committee.

    Important dates

    • CfP and Website online: May 10, 2019
    • Submission Deadline: June 28, 2019
    • Papers Notification: August 14, 2019
    • Papers Final Version Due: August 25, 2019
    • Submission of Camera Ready Papers to Publisher (hard deadline): August 30, 2019
    • Workshop: Monday, November 11, 2019