welcome to proofs proofs security proofs for embedded
play

Welcome to PROOFS! PROOFS: Security Proofs for Embedded Systems - PowerPoint PPT Presentation

Welcome to PROOFS! PROOFS: Security Proofs for Embedded Systems Introduction to the fifth workshop Introduction to the workshop PROOFS: Security Proofs for Embedded Systems UCSB August 20, 2016 5th edition of PROOFS PROOFS 2012:


  1. Welcome to PROOFS!

  2. PROOFS: “Security Proofs for Embedded Systems” Introduction to the fifth workshop Introduction to the workshop PROOFS: Security Proofs for Embedded Systems UCSB — August 20, 2016

  3. 5th edition of PROOFS PROOFS 2012: Leuven PROOFS 2013: UCSB PROOFS 2014: Busan PROOFS 2015: Saint Malo Introduction to the workshop PROOFS: Security Proofs for Embedded Systems

  4. Program of the Day Overview Two invited talks Six contributed talks Introduction to the workshop PROOFS: Security Proofs for Embedded Systems

  5. Invited talks Ryan KASTNER, UCSD, USA. 1 “ Moving Hardware from “Security through Obscurity” to “Secure by Design ” Yuval YAROM, the University of Adelaide, Australia. 2 “ Thwarting cache-based side-channel attacks ” Introduction to the workshop PROOFS: Security Proofs for Embedded Systems

  6. Contributed talks 1 Using Modular Extension to Provably Protect Edwards Curves Against Fault Attacks , Margaux Dugardin, Sylvain Guilley, Martin Moreau, Zakaria Najm and Pablo Rauzy . 2 Mistakes Are Proof That You Are Trying: On Verifying Software Encoding Schemes’ Resistance to Fault Injection Attacks , Jakub Breier, Dirmanto Jap and Shivam Bhasin . Optimal Side-Channel Attacks for Multivariate Leakages and Multiple 3 Models , Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Damien Marion and Olivier Rioul . Algebraic Security Analysis of Key Generation with Physical 4 Unclonable Functions , Matthias Hiller, Michael Pehl, Gerhard Kramer and Georg Sigl . Formal Fault Analysis of Branch Predictors: Attacking 5 countermeasures of Asymmetric key ciphers , Sarani Bhattacharya and Debdeep Mukhopadhyay . Template Attack vs. Bayes Classifier , Stjepan Picek, Annelie Heuser and 6 Sylvain Guilley . Introduction to the workshop PROOFS: Security Proofs for Embedded Systems

  7. Proceedings Soft copies can be downloaded from the website: http://www.proofs-workshop.org/papers . Login: proofs2016 Password: pwd 4 proofs2016 We would like the put presentation slides online Contributed talks can be revised and submitted for a JCEN special section on PROOFS Introduction to the workshop PROOFS: Security Proofs for Embedded Systems

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend