In collaboration with

Accepted Papers

    Towards Sound and Optimal Leakage Detection Procedure
      A. Adam Ding, Liwei Zhang, Francois Durvaux, Francois-Xavier Standaert and Yunsi Fei.

    Leakage Bounds for Gaussian Side Channels
      Thomas Unterluggauer, Thomas Korak, Stefan Mangard, Robert Schilling, Luca Benini, Frank Gurkaynak and Michael Muehlberghuber.

    An EM Fault Injection Susceptibility Criterion and its Application to the Localization of Hotspots
      Maxime Madau, Michel Agoyan and Philippe Maurine.

    Connecting and Improving Direct Sum Masking and Inner Product Masking
      Romain Poussier, Qian Guo, Francois-Xavier Standaert, Claude Carlet and Sylvain Guilley.

    Trace Augmentation: What Can Be Done Even Before Preprocessing in a Profiled SCA?
      Sihang Pu, Yu Yu, Weijia Wang, Junrong Liu, Zheng Guo and Dawu Gu.

    A First-Order Chosen Plaintext DPA Attack on the Third Round of DES
      Oscar Reparaz and Benedikt Gierlichs.

    A Strict Key Enumeration Algorithm for Dependent Score Lists of Side-Channel Attacks
      Yang Li, Shuang Wang, Zhibin Wang and Jian Wang.

    May The Force Be With You: Force-Based Relay Attack Detection
      Iakovos Gurulian, Gerhard Hancke, Konstantinos Markantonakis and Raja Naeem Akram.

    A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher
      Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun and Wang Zhu.

    Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers
      Arthur Beckers, Benedikt Gierlichs and Ingrid Verbauwhede.

    Opening Pandora's Box: Effective Techniques for Reverse Engineering IoT Devices
      Omer Shwartz, Michael Bohadana, Yael Mathov, Yuval Elovici and Yossi Oren

    Optimal First-Order Boolean Masking for Embedded IoT Devices
      Alex Biryukov, Daniel Dinu and Aleksei Udovenko

    Instruction Duplication: Leaky and Not Too Fault-Tolerant!
      Lucian Cojocar, Kostas Papagiannopoulos and Niek Timmers

    Applying Horizontal Clustering Side-channel Attacks on Embedded ECC Implementations
      Erick Nascimento and Lukasz Chmielewski

Important Dates

31 Jul. 2017Abstracts registration
7 Aug. 2017Full paper submission deadline
12 Sep. 2017Notification of acceptance
13 Oct. 2017Camera-ready for pre-proceedings
13-15 Nov. 2017Workshop date
15 Dec 2017Final version of papers

Organised by: