posted by organizer: coflynn || 415 views || tracked by 2 users: [display]

COSADE 2022 : Constructive Side-Channel Analysis and Secure Design

FacebookTwitterLinkedInGoogle


Conference Series : Constructive Side-Channel Analysis and Secure Design
 
Link: http://cosade.org
 
When Apr 12, 2022 - Apr 14, 2022
Where Leuven, Belgium
Submission Deadline Dec 15, 2021
Notification Due Feb 4, 2022
Final Version Due Feb 15, 2022
Categories    hardware security   power analysis   fault injection
 

Call For Papers

============================================================================
CALL FOR PAPERS

COSADE 2022
13th International Workshop on Constructive
Side-Channel Analysis and Secure Design

Leuven, Belgium, April 12-14, 2022
https://www.cosade.org/

============================================================================
IMPORTANT DATES

- Paper Submissions : December 15, 2021
- Notification of Acceptance : February 4, 2022
- Final Version Due : February 15, 2022

All deadlines are 23:59:59 Anywhere on Earth (AoE).

===========================================================================
QUICK LINKS

- COSADE website: https://www.cosade.org/ (to be updated)
- Paper Submission: https://easychair.org/conferences/?conf=cosade22

===========================================================================

Side-channel analysis (SCA) and implementation attacks have become an
important field of research and a real threat. In order to enhance the
resistance of cryptographic and security critical implementations within
the design phase, constructive attacks and analyzing techniques may
serve as a quality metric to optimize the design and development
process. Since 2010, COSADE provides an international platform for
researchers, academics, and industry participants to present their work
and their current research topics. The program committee is seeking
original papers on all aspects of the side-channel analysis and other
implementation attacks as well as efficient and secure implementations.

Submission topics include, but are not limited to:

+ Implementation attacks & countermeasures
- Side-channel analysis, fault-injection attacks, probing and
read-out, hardware trojans, cloning and counterfeiting,
side-channel or fault-injection based reverse engineering,
attacks or countermeasures based on machine learning methods

+ Efficient and secure HW/SW implementations
- Efficient and secure implementations of cryptographic
blocks including post-quantum cryptography, lightweight
cryptography, random number generators, physical unclonable
functions, symmetric cryptography, hash functions,
leakage-resilient cryptography, fault-resistant and
tamper-detection designs, white-box cryptography

+ Measurement setups, evaluation platforms, and open benchmarks
- Practical implementation and comparison of physical attacks
including description of measurement setups, test platforms for
evaluation of physical attacks, open benchmarks for physical
attacks and countermeasures

+ Formal analysis and automated tools
- Security and leakage models, formal analysis of secure
implementations, design automation and tools, evaluation tooling,
domain-specific security analysis of e.g., IoT, medical,
automotive, industrial-control systems, 5G, ...

Authors are invited to submit papers (PDF format) electronically
using the submission form available on
https://easychair.org/conferences/?conf=cosade22

Submitted papers must be original, unpublished, anonymous and not
submitted to journals or other conferences/workshops that have
proceedings. Submissions must be written in English, strictly
follow Springer LNCS format (with default margins, font size, etc.)
and should be at most 18 pages, excluding only references. Papers not
meeting these guidelines risk rejection without consideration.
All submissions will be blind-refereed. Submission implies the
willingness of at least one of the authors to register and present
the paper. The proceedings are expected to be published in the
Springer Lecture Notes in Computer Science (LNCS) series.
Accepted papers must follow the LNCS author instructions at:
https://www.springer.com/gp/computer-science/lncs/conference-proceedings-guidelines

===========================================================================
ORGANIZING COMMITTEE

Steering Committee
Jean-Luc Danger, Telecom Paristech, FR
Werner Schindler, BSI, DE

General Chair
Benedikt Gierlichs, KU Leuven, BE

Program Chairs
Colin O'Flynn, NewAE Technology Inc, CA
Josep Balasch, KU Leuven, BE

===========================================================================

Related Resources

ASHES 2021   Fifth Workshop on Attacks and Solutions in Hardware Security
ICHSA 2021   3rd Israeli Conference on Hardware and Side-Channel Attacks
ICPR 2022   26th International Conference on Pattern Recognition
ICDEPI-SCOPUS 2022   5th International Conference on Design Engineering and Product Innovation (ICDEPI 2022)
IDA 2022   20th Symposium on Intelligent Data Analysis (IDA) 2022, Rennes, France
ICIAP 2021   ICIAP2021 -21th International Conference on Image Analysis and Processing
DAS 2022   DAS 2022: 15th IAPR International Workshop on Document Analysis Systems
ISSTA 2022   International Symposium on Software Testing and Analysis
ACM BSCI 2022   The 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure
(IN)TANGIBLE HERITAGE(S) 2022   (IN)TANGIBLE HERITAGE(S): A conference on design, culture and technology – past, present, and future