COSADE: Constructive Side-Channel Analysis and Secure Design

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2020 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
COSADE 2019 Constructive Side-Channel Analysis and Secure Design
Apr 3, 2019 - Apr 5, 2019 Darmstadt, Germany Dec 1, 2018
 
 

Present CFP : 2019

Side-channel analysis (SCA) and implementation attacks have become an important field of research at universities and in the industry. In order to enhance the resistance of cryptographic and security critical implementations within the design phase, constructive attacks and analyzing techniques may serve as a quality metric to optimize the design and development process. Since 2010, COSADE provides an international platform for researchers, academics, and industry participants to present their work and their current research topics. It is an excellent opportunity to exchange on new results with international experts and to initiate new collaborations and information exchange at a professional level. The workshop will feature both invited presentations and contributed talks.

The tenth International Workshop on Constructive Side-Channel Analysis and Secure Design will be organized and held by the Technical University of Darmstadt.

The topics of COSADE 2019 include, but are not limited to:

# Implementation attacks and exploitations:
Side-channel analysis, fault-injection attacks, probing and read-out, hardware Trojans, cloning and counterfeiting, side-channel or fault- injection based reverse engineering

# Secure implementation:
Cryptographic blocks (including post-quantum and lightweight ciphers), random number generators, physical unclonable functions, leakage- resilient cryptography, fault-injection tolerant design, and tamper-detection

# Implementation attack-resilient architectures and schemes:
Trusted environment (Secure boot, execution, storage, isolation, virtualization, firmware update), protections against micro-architectural side-channels and covert channels, cache attacks, software-enabled implementation attacks, white-box cryptography

# Secure design and evaluation:
Security and leakage models, formal analysis of secure implementations, design automation and tools, evaluation tooling, domain-specific security analysis of e.g., IoT, medical, automotive, industrial-control systems, mobile, security analysis based on artificial intelligence


SUBMISSION
-------------
Submitted papers should present novel contributions related to the topics listed above. They must be original, unpublished, anonymous and not submitted to another conference or journal for consideration of publication. Papers must be written in English and they should not exceed 18 pages. Submissions not meeting these guidelines risk rejection without consideration of their merits. All submissions will be blind-refereed. Authors are invited to submit their manuscripts (PDF or PS format) by filling in the submission form available on the following website: https://easychair.org/my/conference.cgi?conf=cosade19

Submission implies the willingness of at least one of the authors to register and present the paper.
 

Related Resources

ASHES 2021   Fifth Workshop on Attacks and Solutions in Hardware Security
S&P 2022   IEEE Symposium on Security and Privacy (Third deadline)
ICHSA 2021   3rd Israeli Conference on Hardware and Side-Channel Attacks
ICISSP 2022   8th International Conference on Information Systems Security and Privacy
ICDEPI-SCOPUS 2022   5th International Conference on Design Engineering and Product Innovation (ICDEPI 2022)
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
OSDI 2022   16th USENIX Symposium on Operating Systems Design and Implementation
IEEE CSP--EI Compendex, Scopus 2022   2022 IEEE 6th International Conference on Cryptography, Security and Privacy (CSP 2022)--EI Compendex, Scopus
IDA 2022   20th Symposium on Intelligent Data Analysis (IDA) 2022, Rennes, France
IEEE DSC 2022   The 2022 IEEE Conference on Dependable and Secure Computing