Tentative Program
Tuesday 3rd December 2019
Time Slot | Activity |
---|---|
09:00-10:30 | Tutorial 1 (Dr. Debrup Chakraborty) Abstract and Short Bio |
10:30-11:00 | Break |
11:00- 12:30 | Tutorial 1 (Dr. Debrup Chakraborty) (Contd.) |
12:30- 14:00 | Lunch |
14:00- 15:30 (Tutorial 2) |
How to Build a Secure System-on-the-Chip Architecture Prof. Avi Mendelson and Dr. Vinay B. Y. Kumar Abstract and Short Bio |
15:30- 16:00 | Break |
16:00- 17:30 (Tutorial 2) (Contd.) |
How to Build a Secure System-on-the-Chip Architecture Prof. Avi Mendelson and Dr. Vinay B. Y. Kumar |
Wednesday 4th December 2019
Time Slot | Activity |
---|---|
09:00-10:30 | Tutorial 3 (Prof. Shahar Kvatinsky) (slides) Abstract and Short Bio |
10:30-11:00 | Break |
11:00- 12:30 | Tutorial 3 (Prof. Shahar Kvatinsky) (Contd.) |
12:30- 14:00 | Lunch |
14:00- 15:30 | Tutorial 4 (Dr. Yu Sasaki) Abstract and Short Bio |
15:30- 16:00 | Break |
16:00- 17:30 | Tutorial 4 (Dr. Yu Sasaki) (Contd.) |
Thursday 5th December 2019
Time Slot | Activity |
---|---|
09:00-10:00 | Inauguration |
10:00-11:00 | Invited Talk 1 (Uri Bear) Abstract and Short Bio |
11:00- 11:30 | Break |
11:30- 12:30 | Invited Talk 2 (Dr. Shashwat Raizada) Abstract and Short Bio |
12:30- 14:00 | Lunch |
14:00- 16:00 (Technical Session 1) |
A Study of Persistent Fault Analysis (slides) Andrea Caforio and Subhadeep Banik |
Formal Analysis of PUF Instances Leveraging Correlation-Spectra in Boolean Functions (slides) Durba Chatterjee, Aritra Hazra and Debdeep Mukhopadhyay |
|
ProTro: A Probabilistic Counter based Hardware Trojan Attack on FPGA based MACSec enabled Ethernet Switch (slides) Vidya Govindan, Sandhya Koteshwara, Amitabh Das, Keshab K. Parhi and Rajat Subhra Chakraborty |
|
One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA Léo Weissbart, Stjepan Picek and Lejla Batina |
|
16:00- 16:30 | Break |
16:30- 17:30 | Poster Session |
19:00 Onwards | Dinner |
Friday 6th December 2019
Time Slot | Activity |
---|---|
09:00-10:00 | Invited Talk 3 (Prof. Makoto Nagata) Abstract and Short Bio |
10:00-10:50 |
Panel Discussion The future of ciphers and role of Hardware and AI |
10:50-11:20 | Break |
11:20- 13:20 (Technical Session 2: Cryptanalysis) |
Internal state recovery attack on Stream Ciphers : Breaking BIVIUM (slides) Shravani Shahapure, Virendra Sule and Rohin Daruwala |
Related-key Differential Cryptanalysis of Full Round CRAFT (slides) Muhammad Elsheikh and Amr Youssef |
|
An Efficient Practical Implementation of Impossible Differential Cryptanalysis Attack on five-round AES-128 using Parallelism (slides) Debranjan Pal, Dishank Agrawal, Abhijit Das and Dipanwita Roy Chowdhury |
|
SpookChain: Chaining a Sponge-Based AEAD with Beyong-Birthday Security (slides) Gaëtan Cassiers, Chun Guo, Olivier Pereira, Thomas Peters and François-Xavier Standaert |
|
13:20- 14:20 | Lunch |
14:20- 18:00 | Half Day Excursion |
19:00 Onwards | Conference Banquet |
Saturday 7th December 2019
Time Slot | Activity |
---|---|
09:00-10:00 (Revised) | Invited talk 4 (Stjepan Picek) Abstract and Short Bio |
10:00-10:30 | Break |
10:30- 11:30 (Revised) | Invited talk 5 (Debdeep Mukhopadhyay) Talk Title: Hardware Security and Block Chains: Opportunities and Challenges |
11:30- 12:30 (Technical Session 3) |
Automated Classification of Web-Application Attacks for Intrusion Detection Harsh Bhagwani, Anand Handa, Nitesh Kumar and Sandeep Kumar Shukla |
Encrypted Classification Using Secure K-Nearest Neighbour Computation (slides) B Pradeep Kumar Reddy and Ayantika Chatterjee |
|
12:30- 14:00 | Lunch |
14:00- 15:00 (Technical Session 4) |
A Few Negative Results on Constructions of MDS Matrices Using Low XOR Matrices Kishan Chand Gupta, Sumit Kumar Pandey and Susanta Samanta |
Revisiting the Security of LPN based RFID Authentication Protocol and Potential Exploits in Hardware Implementations (slides) Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay and Rajat Subhra Chakraborty |
|
15:00- 15:30 | Concluding Remarks |