Session 1: Side Channel Attacks and Countermeasures |
Kamil Gomina, Jean-Baptiste Rigaud, Philippe Gendrier, Philippe Candelier and Assia Tria | Detecting positive voltage attacks on CMOS circuits Slides |
Jean-Luc Danger, Nicolas Debande, Sylvain Guilley and Youssef Souissi | High-Order Timing Attacks Slides |
Stjepan Picek, Baris Ege, Lejla Batina, Domagoj Jakobovic, Lukasz Chmielewski and Marin Golub | On Using Genetic Algorithms for Intrinsic Side-Channel Resistance: The Case of AES S-Box Slides |
Coffee Break & Poster Session |
Reinhard Berlach, Michael Lackner, Johannes Loinig, Ernst Haselsteiner and Christian Steger | Memory-Efficient On-Card Byte Code Verification for Java Cards Slides |
Robert Seepers, Christos Strydis, Ioannis Sourdis and Chris de Zeeuw | Adaptive Entity-Identifier Generation for IMD Emergency Access Slides |
Vishal Saraswat, Daniel Feldman, Dennis Foo Kune and Satyajit Das | Remote Cache-timing Attacks Against AES Slides |
Keynote Speech: A Golden Standard for Protecting Software against Man-at-the-End Attacks Slides |
Bjorn De Sutter, Computer Systems Lab. - Ghent University | |
Session 2: Embedded Systems Security |
Michael Lackner, Reinhard Berlach, Reinhold Weiss and Christian Steger | Countering Type Confusion and Buffer Overflow Attacks on Java Smart Cards by Data Type Sensitive Obfuscation Slides |
Pierre Schnarz, Joachim Wietzke and Ingo Stengel | Towards Attacks on Restricted Memory Areas through Co-Processors in Embedded Multi-OS Environments via Malicious Firmware Injection Slides |
Raphael Spreitzer and Joern-Marc Schmidt | Group-Signature Schemes on Constrained Devices: The Gap Between Theory and Practice Slides |