TOP
Suche auf der Schloss Dagstuhl Webseite
Sie suchen nach Informationen auf den Webseiten der einzelnen Seminare? - Dann:
Nicht fündig geworden? - Einige unserer Dienste laufen auf separaten Webseiten mit jeweils eigener Suche. Bitte beachten Sie folgende Liste:
Schloss Dagstuhl - LZI - Logo
Schloss Dagstuhl Services
Seminare
Innerhalb dieser Seite:
Externe Seiten:
  • DOOR (zum Registrieren eines Dagstuhl Aufenthaltes)
  • DOSA (zum Beantragen künftiger Dagstuhl Seminare oder Dagstuhl Perspektiven Workshops)
Publishing
Innerhalb dieser Seite:
Externe Seiten:
dblp
Innerhalb dieser Seite:
Externe Seiten:
  • die Informatik-Bibliographiedatenbank dblp


Dagstuhl-Seminar 16202

Hardware Security

( 16. May – 20. May, 2016 )

(zum Vergrößern in der Bildmitte klicken)

Permalink
Bitte benutzen Sie folgende Kurz-Url zum Verlinken dieser Seite: https://www.dagstuhl.de/16202

Organisatoren

Kontakt



Motivation

The convergence of IT systems, data networks (including but not limited to the Internet) and ubiquitous embedded devices within the cyber-physical system paradigm has led to the emergence of new security threats associated with the system hardware. Manipulating the hardware components that implement security functions can compromise system integrity, provide unauthorized access to protected data, and endanger intellectual property. Additionally, secure hardware is required to protect software in a proper manner tampering. Addressing these vulnerabilities is essential in order to prevent the hardware from becoming the Achilles heel of today’s systems. Current technology trends point towards massive utilization of hardware circuits in larger cyberphysical systems that are interacting with the physical environment via sensors and actuators. At the same time cyber physical systems are more and more integrated via open networks, most notably the Internet. Moreover, they interact with each other, forming systems of systems that exhibit highly complex, emergent behavior and constantly change their boundaries, with new sub-systems continuously entering and leaving. As a consequence, hardware-related threats must be addressed by appropriate countermeasures at realistic costs.

The seminar will focus on security threats where hardware components play the main role, and on countermeasures to address these threats. The emphasis is on generic algorithmic advances on the boundary between computer science and other disciplines. While Hardware Security is a very diverse scientific field, the seminar will specifically focus on its three main areas: passive and active side-channel analysis of security-relevant hardware components (cryptographic blocks, true random number generators) which goes beyond classical cryptanalysis; physical unclonable functions (PUFs) and authentication solutions on their basis; and new threats through hardware Trojans and counterfeit ICs as well as techniques for their detection and neutralization.

The following questions will serve as a starting point:

  • How to model side-channel attacks such as to balance between accuracy and simplicity?
  • Are there automatic methods to derive a fault-based attack for a given secure circuit?
  • How much reverse engineering is required for practical attacks, and can it be prevented?
  • Can code-based error detection provide a generic mechanism against attacks and Trojans?
  • How to balance between security, quality, yield and reliability of an integrated circuit?
  • How dependent are physical unclonable functions on specific sources of variability?
  • What are the best PUF-based protocols, and what emerging applications do they enable?
  • Can hardware Trojans be detected by low-cost approaches with sufficient confidence?
  • How do counterfeit ICs compromise system security, reliability, and availability?

The seminar will bring together researchers working on different aspects of hardware security and contributing competence in neighboring disciplines: cryptography and cryptanalysis; electrical engineering and circuit design; formal methods and solver technology; test methods, reliability and failure analysis; and information and coding theory. Scientists from academia and industry throughout the world are invited to the seminar.


Summary

The convergence of IT systems, data networks (including but not limited to the Internet) and ubiquitous embedded devices within the cyberphysical system paradigm has led to the emergence of new security threats associated with the system hardware. Manipulating the hardware components that implement security functions can compromise system integrity, provide unauthorized access to protected data, and endanger intellectual property. Additionally, secure hardware is required to protect software in a proper manner tampering. Addressing these vulnerabilities is essential in order to prevent the hardware from becoming the Achilles heel of today's systems. Current technology trends point towards massive utilization of hardware circuits in larger cyberphysical systems that are interacting with the physical environment via sensors and actuators. At the same time cyberphysical systems are more and more integrated via open networks, most notably the Internet. Moreover, they interact with each other, forming systems of systems that exhibit highly complex, emergent behavior and constantly change their boundaries, with new sub-systems continuously entering and leaving. As a consequence, hardware-related threats must be addressed by appropriate countermeasures at realistic costs.

The seminar will focus on security threats where hardware components play the main role, and on countermeasures to address these threats. The emphasis is on generic algorithmic advances on the boundary between computer science and other disciplines. While Hardware Security is a very diverse scientific field, the seminar will specifically focus on its three main areas: passive and active side-channel analysis of security-relevant hardware components (cryptographic blocks, true random number generators) which goes beyond classical cryptanalysis; physical unclonable functions (PUFs) and authentication solutions on their basis; and new threats through hardware Trojans and counterfeit ICs as well as techniques for their detection and neutralization.

Copyright Osnat Keren and Ilia Polian and Mark M. Tehranipoor

Teilnehmer
  • Lejla Batina (Radboud University Nijmegen, NL) [dblp]
  • Georg T. Becker (Ruhr-Universität Bochum, DE) [dblp]
  • Christian Boit (TU Berlin, DE) [dblp]
  • Jan Burchard (Universität Freiburg, DE) [dblp]
  • Wayne P. Burleson (University of Massachusetts - Amherst, US) [dblp]
  • Jean-Luc Danger (ENST - Paris, FR) [dblp]
  • Linus Feiten (Universität Freiburg, DE) [dblp]
  • Domenic Forte (University of Florida - Gainesville, US) [dblp]
  • Fatemeh Ganji (TU Berlin, DE) [dblp]
  • Swaroop Ghosh (University of South Florida, US) [dblp]
  • Jorge Guajardo Merchan (Robert Bosch LLC - Pittsburgh, US) [dblp]
  • Tim Erhan Güneysu (Universität Bremen, DE) [dblp]
  • Sorin A. Huss (TU Darmstadt, DE) [dblp]
  • Michael Hutter (Cryptography Research Inc. - San Francisco, US) [dblp]
  • Ramesh Karri (New York University, US) [dblp]
  • Osnat Keren (Bar-Ilan University, IL) [dblp]
  • Tanja Lange (TU Eindhoven, NL) [dblp]
  • Roel Maes (Intrinsic-ID - Eindhoven, NL) [dblp]
  • Nele Mentens (KU Leuven, BE) [dblp]
  • Debdeep Mukhopadhyay (Indian Institute of Technology - Kharagpur, IN) [dblp]
  • Ruben Niederhagen (TU Eindhoven, NL) [dblp]
  • Sikhar Patranabis (Indian Institute of Technology - Kharagpur, IN) [dblp]
  • Elad Peer (CISCO Systems - Haifa, IL)
  • Ilia Polian (Universität Passau, DE) [dblp]
  • Wenjing Rao (University of Illinois - Chicago, US) [dblp]
  • Francesco Regazzoni (University of Lugano, CH) [dblp]
  • Ulrich Rührmair (Ruhr-Universität Bochum, DE) [dblp]
  • Kazuo Sakiyama (The University of Electro-Communications - Tokyo, JP) [dblp]
  • Werner Schindler (BSI - Bonn, DE) [dblp]
  • Georg Sigl (TU München, DE) [dblp]
  • Shahin Tajik (TU Berlin, DE) [dblp]
  • Mark M. Tehranipoor (University of Florida - Gainesville, US) [dblp]

Klassifikation
  • hardware
  • security / cryptology

Schlagworte
  • Hardware Security
  • Cryptographic Primitives
  • Side-channel Cryptanalysis
  • Hardware Trojans
  • Physically Unclonable Functions