December 16, 2024 (DAY 0) (All Time in Japan Standard Time)
5:30 PM - 6:30 PM Registration Place: 2nd floor of the symposium venue
6:30 PM - 8:30 PM Symposium Reception Place: 4th floor of the symposium venue
December 17, 2024 (DAY 1) (All Time in Japan Standard Time)
Registration: 8:30 AM - 17:00 PM Place: 2nd floor of the symposium venue
9:00 AM - 9:20 AM
Opening Remarks
9:20 AM - 10:10 AM
Keynote 1 Session Chair: Makoto Nagata Speaker: Bart Preneel (COSIC, KU Leuven) Title: Cryptography and Supply Chain Security
10:10 AM - 10:30 AM BREAK
10:30 AM - 11:30 AM
Regular Paper Session 1: Physical Phenomena for Hardware Security Session Chair: Junko Takahashi (Nippon Telegraph and Telephone Corporation)
Unveiling Security MRAM-OTP Macro Using MTJ Hard Breakdown Mechanism Jiongzhe Su, Haoran Du, Quanhai Zhu, Mingtao Chen, Keyang Zhang, Bo Liu, Hao Cai- National ASIC System Engineering Center, School of Integrated Circuits, Southeast University
A True Random Number Generator on FPGA with Jitter-Sampling by Ring Generator Tuan Kiet Dang, Trong-Thuc Hoang, Cong-Kha Pham - The University of Electro-Communications
Truly Random Number Generation by Using In-Plane Magnetic Tunnel Junction with Weak Anisotropy You Wang, Chaoyue Zhang, Yu Gong, Hao Cai, Weiqiang Liu - Nanjing University of Aeronautics and Astronautics, Southeast University
LUNCH BREAK
1:00 PM - 1:50 PM
Keynote 2 Session Chair: Yuichi Hayashi Speaker: Katsumi Takahashi (Nippon Telegraph and Telephone Corporation) Title: Security R&D from a Telecommunication Company
High Reliable Processor-Based PUF on Voltage Over-Scaling Technique Xinyuan Zhao, Yijun Cui, Fei Lyu, Chongyan Gu, Chenghua Wang, Weiqiang Liu - Nanjing University of Aeronautics and Astronautics, QUEEN'S UNIVERSITY BELFAST
Sorting Attacks Resilient Authentication Protocol for CMOS Image Sensor Based PUF Anurag Kamal, Vishesh Mishra, Sparsh Mittal, Mahendra Rathor, Chandan Kumar, Urbi Chatterjee - IIT Kanpur, IIT Roorkee, DAVV Indore
A Novel FPGA Mutually Coupled Configurable Ring Oscillator PUF James Moore, Jack Miskelly, Maire O'Neill, Chongyan Gu - Electronics Communications and Information Technology, ECIT, Queen’s University Belfast, Belfast, U.K
AutoGuard: A Secure Implementation of the Conditional Branch Instruction Zeru Lan, Chunlu Wang, Pengfei Qiu, Yu Jin, Yihao Yang, Dongsheng Wang, Xiaoyong Li, Gang Qu - Key Laboratory of Trustworthy Distributed Computing and Service (BUPT), Ministry of Education, Beijing, China, Department of Computer Science and Technology, Tsinghua University, Zhongguancun Laboratory, Beijing, China, Department of Electrical and Computer Engineering & Institute for Systems Research, University of Maryland, USA * Best Paper Award Candidates.
Automated Search of Instructions Vulnerable to Fault Injection Attacks in Command Authorization Checks of a TPM 2.0 Implementation Ville Yli-Mayry, Thomas Perianin, Sylvain Guilley - Secure-IC K.K., Secure-IC S.A.S. * Best Paper Award Candidates.
Analysis and Mitigation of Hybrid CMOS/MRAM DFF Vulnerabilities to Laser Fault Injection Raphael Comps, Jean-Baptiste Rigaud, Jean-Max Dutertre - Mines Saint-Etienne, CEA, Leti, Centre CMP F - 13541 Gardanne France
A Black-Box Targeted Misclassification Attack on Edge AI with Adversarial Examples Generated from RAW Image Sensor Data Bowen Hu, Weiyang He, Kuo Wang, Chip-Hong Chang- Nanyang Technological University * Best Paper Award Candidates.
4:30 PM - 5:00 PM
Exhibition Session
6:30 PM - 8:30 PM Gala Dinner Place: Fukuju https://enjoyfukuju.com/en/
(Bus will depart at 17:30 in front of the symposium venue) Session Chair: TBA Invited Speaker: TBA Title: TBA
December 18, 2024 (DAY 2) (All Time in Japan Standard Time)
Registration: 8:30 AM - 15:00 PM Place: 2nd floor of the symposium venue
9:00 AM - 9:10 AM
Announcement
9:10 AM - 10:00 AM
Keynote 3 Session Chair: Weiqiang Liu Speaker: Patrick Schaumont (Worcester Polytechnic Institute) Title: Practical Security Models for Cryptographic Chip Design
10:00 AM - 10:20 AM BREAK
10:20 AM - 11:40 PM
Regular Paper Session 4: Advanced Physical Attacks (2) Session Chair: Qiu Pengfei (Beijing University of Posts and Telecommunications)
Power Side-Channel Key Recovery Attack on a Hardware Implementation of BIKE Luke Beckwith, Huizhen Zhou, Jens-Peter Kaps, Kris Gaj - George Mason University
Exact Template Attacks with Spectral Computation Meriem Mahar, Maamar Ouladj, Sylvain Guilley, Hacène Belbachir, Farid Mokrane - CERIST, Algeria and Université Paris 8, LAGA, UMR 7539, France, CEntre de Recherche sur l'Information Scientifique etTechnique (CERIST), Algeria, TELECOM-ParisTech, Secure-IC S.A.S. Rennes and ENS Paris, RECITS Laboratory, Mathematics faculty, USTHB, Algiers, Algeria, Université Paris 8, LAGA, UMR 7539, France
Yet Another Physical Leakage Assessment with the Wasserstein Distance Haruka Hirata, Yusaku Harada, Yuko Hara, Kazuo Sakiyama, Yang Li - The University of Electro-Communications, Institute of Science Tokyo
A Hybrid Simulation Approach for Accurate and Fast System-Level Side-Channel Leakage Evaluation Kazuki Monta, Rikuu Hasegawa, Takafumi Oki, Takuya Wadatsumi, Takuji Miki, Makoto Nagata, Lang Lin, Norman Chang - Secafy Co., Ltd., Kobe University, ANSYS
LUNCH BREAK
1:00 PM - 1:50 PM
Keynote 4 Session Chair: Yier Jin Speaker: Rui Hou (Institute of Information Engineering, Chinese Academy of Sciences) Title: The Security Architecture Design for General-Purpose Processors
1:50 PM - 2:50 PM
Regular Paper Session 5: Security and Verification in RISC-V and Embedded Systems Session Chair: Nashimoto Shoei (Mitsubishi Electric Corporation)
A Consistency Testing Method for Revealing RISC-V Processor's Undocumented Instructions Wen Wang, Peng Liu - College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou, China
SecRiSBen: A RISC-V Based SoC Benchmark for Evaluation of Security Verification Tools Maoyuan Cai, Aijiao Cui, Yier Jin - Harbin Institute of Technology (Shenzhen), University of Science and Technology of China
PreLock: Precision Locking for Protecting Embedded Processor Tomosuke Ichioka, Yohei Watanabe, Yuko Hara - Tokyo Institute of Technology, The University of Electro-Communications
RCRO-PUF: A Reliable and Low-Power RRAM-Based CRO PUF for Enhanced Security Jiang Li, Yijun Cui, Chenghua Wang, Chongyan Gu and Weiqiang Liu - College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics
Pre-Silicon Formal Verification and Post-Silicon Runtime Monitoring on RISC-V Processors Czea Sie Chuah and Christian Appold - School of Computation, Information and Technology, Technical University of Munich
MTPM-PUF: A Configurable and Low-Power Logic-Compatible Multiple-Time Programmable (MTP) Memory-Based Intrinsic PUF Kangkang Rui, Yao Li, Jiang Li, Yijun Cui and Chenghua Wang - College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics
Optimized hardware implementation of Plantard modular reduction for Lattice-Based Cryptography Jiansheng Chen, Mengxue Li, Bei Wang, Yijun Cui, Chenghua Wang and Weiqiang Liu - College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics
Research on Hardware Vulnerability Detection via Fuzzing Test Lei Peng, Aijiao Cui, Gang Qu and Wei Zhang - Harbin Institute of Technology
Exploring Security Threats in Automated AI Accelerator Generation Platforms Chao Guo - Graduate School of Fundamental Science and Engineering, Waseda University
Measurement and Simulation of On-chip Voltage Fluctuation Caused by EM Injection Rikuu Hasegawa, Takuya Wadatsumi, Kazuki Monta, Takuji Miki, Lang Lin, Norman Chang and Makoto Nagata - Graduate School of Science, Technology and Innovation, Kobe University
Detection Method for Hardware Trojans in PCBs and Peripherals Using Oscillation Frequency Changes in Digital Ring Oscillators Koki Abe, Daisuke Fujimoto and Yuichi Hayashi - Graduate School of Science and Technology, Nara Institute of Science and Technology
A Lightweight and Efficient BRAM-free NTT Unit for Crystals-Dilithium Junjie Zhong, Bei Wang, Zeren Zhu, Weiqiang Liu and Yijun Cui - College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics
A Simulation Technique of Thermal Side Channel Leakage of Cryptographic Circuits Shuhei Yokota, Rikuu Hasegawa, Kazuki Monta, Takaaki Okidono, Takuji Miki and Makoto Nagata - Science Technology and Information, Kobe University
A Non-Invasive Method for Detecting Aging of Microcontrollers Based on Side-Channel Analysis Yuki Kaneko and Naofumi Homma - Research Institute of Electrical Communication/Graduate School of Engineering, Tohoku University
A Technique for Label Inference Attack on Split Learning Lixin Zhang, Xinyan Gao, Ran Mao, Yintai Sun, Yuexiang Jin, Zhenyu Guan and Song Bian - School of Cyber Science and Technology, Beihang University
Verify the Relationship Between Randomness and D-FF Synchronous Circuit Size in RO-based RNG Ryoichi Sato, Mitsuki Fujiwara, Yasuyuki Nogami and Yuta Kodera - Graduate School of Environmental, Life, Natural Science and Technology, Okayama University
Probing Attacks on PUFs James Moore, Jack Miskelly and Chongyan Gu - Queen's University Belfast
4:10 PM - 5:10 PM
PhD Forum Poster with Snacks and Drink Place: 1st floor of the symposium venue
5:10 PM - 5:40 PM
Closing Remarks and Awards Announcement