Program
Wednesday April 13th
18:00 - 18:30 Registration @ Burggarten/Orangerie Graz.18:30 - 21:30 Welcome reception @ Burggarten/Orangerie Graz.
Thursday April 14th
Conference at Hotel WEITZER
| 08:00 | Registration Opens | 
| 08:45 09:00  | 
Welcome, Opening Remarks | 
09:00 | 
        Session 1: Security and Physical Attacks | 
| 09:00 | 
         
                Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption  | 
| 09:30 | 
         
                Co-location detection on the Cloud  | 
| 10:00 | 
         
                Simple Photonic Emission Attack with Reduced Data Complexity  | 
| 10:30 11:00  |         
  Coffee break | 
11:00 | 
        Invited Talk I | 
| 
         
        Analyzing thousands of firmware images and a few physical devices. What's next?  | 
|
| 12:00 14:00  |          Lunch break | 
14:00 | 
        Session 2: Side-Channel Analysis (case studies) | 
| 14:00 | 
         
                Power Analysis Attacks against IEEE 802.15.4 Node  | 
| 14:30 | 
         
                Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series  | 
| 15:00 | 
         
                Dismantling real-world ECC with Horizontal and Vertical Template Attacks  | 
| 15:30 16:00  |         Coffee break | 
16:00 | 
        Invited Talk II | 
| 
         
        Advanced statistical tests for information leakage.  | 
|
19:00 | 
        Social Event: Conference Dinner at Schlossbergrestaurant | 
Friday April 15th
Conference at Hotel WEITZER
09:00 | 
        Session 3: Fault Analysis | 
| 09:00 | 
         
        Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT  | 
| 09:30 | 
         
        Improved Differential Fault Analysis on Camellia-128  | 
| 10:00 | 
         
        A Note on the Security of CHES 2014 Symmetric Infective Countermeasure  | 
| 10:30 11:00  |         Coffee break | 
11:00 | 
        Invited Talk III | 
| 
         
        Formal and Compositional Proofs of Probing Security for Masked Algorithms  | 
|
| 12:00 14:00  |          
  Lunch break | 
14:00 | 
        Session 4: Side-Channel Analysis (tools) | 
| 14:00 | 
         
                Simpler, Faster, and More Robust T-test Based Leakage Detection  | 
| 14:30 | 
         
                Design and implementation of a waveform-matching based triggering system  | 
| 15:00 | 
         
                 Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order  | 
| 15:30 15:35  | 
         
 Closing Remarks and Farewell | 








