SPRINGER
LNCS
GOLD SPONSORS
Riscure
Secure-iC
Newae
eShard
eShard

SILVER SPONSORS
PQSHIELD
Rambus Texplained NXP

Program

Sunday, April 10

18:00 - 20:00

Social event - Brewery tour and beer tasting

We will meet at 17:45 at the corner of Eikstraat and Jozef Vounckplein, in front of the entrance of Domus brewery, for the tour. Afterwards we go to Domus restaurant for the beer tasting. If you are not able to join us for the tour, please feel welcome to join us later (say from 19:00 onward) in the restaurant. We will probably stay there longer than 20:00 :-)

Monday, April 11

Conference at Aula Zeger Van Hee in Leuven

10:00 - 11:00

Registration / Coffee

11:00 - 11:15

Opening / Welcome

11:15 - 12:30

Industry Session

Thomas Roche and Victor Lomné (NinjaLab), "A Side Journey to Titan"

Guillaume Vilcocq, Lionel Rivière and Hugues Thiebeauld (eShard), "On the impact of SCA tools performance for IC Security"

12:30 - 14:00

Lunch

14:00 - 15:00

Invited talk

Session chair: Josep Balasch

Dan Page, "Abstractions and tooling for leakage evaluation"

15:00 - 15:30

Coffee Break

15:30 - 16:45

Session 1: Machine / Deep learning

Session chair: Lennert Wouters

Machine-Learning assisted Side-Channel Attacks on RNS-based ECC Implementations using Hybrid Feature Engineering. Naila Mukhtar (School of Engineering, Macquarie University, Australia), Louiza Papachristodoulou (Fontys University of Applied Sciences, The Netherlands), Apostolos P. Fournaris (Industrial Systems Institute/R.C. ATHENA, Greece), Lejla Batina (Radboud University Nijmegen, The Netherlands), Yinan Kong (School of Engineering, Macquarie University, Australia)

Focus is Key to Success: A Focal Loss Function for Deep Learning-based Side-channel Analysis. Maikel Kerkhof (Delft University of Technology, The Netherlands) , Lichao Wu (Delft University of Technology, The Netherlands) , Guilherme Perin (Delft University of Technology, The Netherlands), and Stjepan Picek (Radboud University & Delft University of Technology, The Netherlands)

On the Evaluation of Deep Learning-based Side-channel Analysis. Lichao Wu (Delft University of Technology, The Netherlands), Guilherme Perin (Delft University of Technology, The Netherlands), and Stjepan Picek (Radboud University & Delft University of Technology, The Netherlands)

18:00 - 19:00

Reception

19:00 - 22:00

Banquet

Tuesday, April 12

Conference at Aula Zeger Van Hee in Leuven

09:00 - 10:15

Session 2: Tools & References

Session chair: Francesco Regazzoni

A Second Look at the ASCAD Databases. Maximilian Egger (Technical University of Munich), Thomas Schamberger (Technical University of Munich), Lars Tebelmann (Technical University of Munich), Florian Lippert (Technical University of Munich) and Georg Sigl (Technical University of Munich)

FIPAC: Thwarting Fault- and Software-Induced Control-Flow Attacks with ARM Pointer Authentication. Robert Schilling (Graz University of Technology), Pascal Nasahl (Graz University of Technology), Stefan Mangard (Graz University of Technology, Lamarr Security Research)

Body Biasing Injection: To thin or not to thin the substrate? Geoffrey Chancel (University of Montpellier, LIRMM), Jean-Marc Gallière (University of Montpellier, LIRMM) and Philippe Maurine (University of Montpellier, LIRMM)

10:15 - 10:45

Coffee Break

10:45 - 12:00

Session 3: Attacks

Session chair: Olivier Bronchain

On the susceptibility of Texas Instruments SimpleLink platform microcontrollers to non-invasive physical attacks. Lennert Wouters (KU Leuven), Benedikt Gierlichs (KU Leuven) and Bart Preneel (KU Leuven)

Single-trace clustering power analysis of the point-swapping procedure in the three point ladder of Cortex-M4 SIKE. Aymeric Genet (EPFL, Kudelski Group) and Novak Kaluđerović (EPFL)

Canonical DPA attack on HMAC-SHA1/SHA2. Frank Schuhmacher (Segrids GmbH)

12:00 - 13:30

Lunch

13:30 - 14:30

Invited talk

Jiska Classen, "Repurposing Wireless Stacks for In-Depth Security Analysis"

Session chair: Colin O'Flynn
14:30 - 15:00

Coffee Break

15:00 - 16:15

Session 4: Masking

Session chair: Amir Moradi

Provable Secure Software Masking in the Real-World. Arthur Beckers (KU Leuven), Lennert Wouters (KU Leuven), Benedikt Gierlichs (KU Leuven), Bart Preneel (KU Leuven) and Ingrid Verbauwhede (KU Leuven)

Systematic Study of Decryption and Re-Encryption Leakage: the Case of Kyber. Melissa Azouaoui (NXP semiconductors, Germany), Olivier Bronchain (UCLouvain, ICTEAM/ELEN/Crypto Group, Belgium), Clément Hoffmann (UCLouvain, ICTEAM/ELEN/Crypto Group), Yulia Kuzovkova (NXP semiconductors, Germany), Tobias Schneider (NXP semiconductors, Austria), François-Xavier Standaert (UCLouvain, ICTEAM/ELEN/Crypto Group)

Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations. Charles Momin (UCLouvain), Gaëtan Cassiers (UCLouvain), François-Xavier Standaert (UCLouvain)

16:15 - 16:20

Farewell


Organized by
COSIC (KU Leuven) KU Leuven