TOP
Search the Dagstuhl Website
Looking for information on the websites of the individual seminars? - Then please:
Not found what you are looking for? - Some of our services have separate websites, each with its own search option. Please check the following list:
Schloss Dagstuhl - LZI - Logo
Schloss Dagstuhl Services
Seminars
Within this website:
External resources:
  • DOOR (for registering your stay at Dagstuhl)
  • DOSA (for proposing future Dagstuhl Seminars or Dagstuhl Perspectives Workshops)
Publishing
Within this website:
External resources:
dblp
Within this website:
External resources:
  • the dblp Computer Science Bibliography


Dagstuhl Seminar 16202

Hardware Security

( May 16 – May 20, 2016 )

(Click in the middle of the image to enlarge)

Permalink
Please use the following short url to reference this page: https://www.dagstuhl.de/16202

Organizers

Contact



Motivation

The convergence of IT systems, data networks (including but not limited to the Internet) and ubiquitous embedded devices within the cyber-physical system paradigm has led to the emergence of new security threats associated with the system hardware. Manipulating the hardware components that implement security functions can compromise system integrity, provide unauthorized access to protected data, and endanger intellectual property. Additionally, secure hardware is required to protect software in a proper manner tampering. Addressing these vulnerabilities is essential in order to prevent the hardware from becoming the Achilles heel of today’s systems. Current technology trends point towards massive utilization of hardware circuits in larger cyberphysical systems that are interacting with the physical environment via sensors and actuators. At the same time cyber physical systems are more and more integrated via open networks, most notably the Internet. Moreover, they interact with each other, forming systems of systems that exhibit highly complex, emergent behavior and constantly change their boundaries, with new sub-systems continuously entering and leaving. As a consequence, hardware-related threats must be addressed by appropriate countermeasures at realistic costs.

The seminar will focus on security threats where hardware components play the main role, and on countermeasures to address these threats. The emphasis is on generic algorithmic advances on the boundary between computer science and other disciplines. While Hardware Security is a very diverse scientific field, the seminar will specifically focus on its three main areas: passive and active side-channel analysis of security-relevant hardware components (cryptographic blocks, true random number generators) which goes beyond classical cryptanalysis; physical unclonable functions (PUFs) and authentication solutions on their basis; and new threats through hardware Trojans and counterfeit ICs as well as techniques for their detection and neutralization.

The following questions will serve as a starting point:

  • How to model side-channel attacks such as to balance between accuracy and simplicity?
  • Are there automatic methods to derive a fault-based attack for a given secure circuit?
  • How much reverse engineering is required for practical attacks, and can it be prevented?
  • Can code-based error detection provide a generic mechanism against attacks and Trojans?
  • How to balance between security, quality, yield and reliability of an integrated circuit?
  • How dependent are physical unclonable functions on specific sources of variability?
  • What are the best PUF-based protocols, and what emerging applications do they enable?
  • Can hardware Trojans be detected by low-cost approaches with sufficient confidence?
  • How do counterfeit ICs compromise system security, reliability, and availability?

The seminar will bring together researchers working on different aspects of hardware security and contributing competence in neighboring disciplines: cryptography and cryptanalysis; electrical engineering and circuit design; formal methods and solver technology; test methods, reliability and failure analysis; and information and coding theory. Scientists from academia and industry throughout the world are invited to the seminar.


Summary

The convergence of IT systems, data networks (including but not limited to the Internet) and ubiquitous embedded devices within the cyberphysical system paradigm has led to the emergence of new security threats associated with the system hardware. Manipulating the hardware components that implement security functions can compromise system integrity, provide unauthorized access to protected data, and endanger intellectual property. Additionally, secure hardware is required to protect software in a proper manner tampering. Addressing these vulnerabilities is essential in order to prevent the hardware from becoming the Achilles heel of today's systems. Current technology trends point towards massive utilization of hardware circuits in larger cyberphysical systems that are interacting with the physical environment via sensors and actuators. At the same time cyberphysical systems are more and more integrated via open networks, most notably the Internet. Moreover, they interact with each other, forming systems of systems that exhibit highly complex, emergent behavior and constantly change their boundaries, with new sub-systems continuously entering and leaving. As a consequence, hardware-related threats must be addressed by appropriate countermeasures at realistic costs.

The seminar will focus on security threats where hardware components play the main role, and on countermeasures to address these threats. The emphasis is on generic algorithmic advances on the boundary between computer science and other disciplines. While Hardware Security is a very diverse scientific field, the seminar will specifically focus on its three main areas: passive and active side-channel analysis of security-relevant hardware components (cryptographic blocks, true random number generators) which goes beyond classical cryptanalysis; physical unclonable functions (PUFs) and authentication solutions on their basis; and new threats through hardware Trojans and counterfeit ICs as well as techniques for their detection and neutralization.

Copyright Osnat Keren and Ilia Polian and Mark M. Tehranipoor

Participants
  • Lejla Batina (Radboud University Nijmegen, NL) [dblp]
  • Georg T. Becker (Ruhr-Universität Bochum, DE) [dblp]
  • Christian Boit (TU Berlin, DE) [dblp]
  • Jan Burchard (Universität Freiburg, DE) [dblp]
  • Wayne P. Burleson (University of Massachusetts - Amherst, US) [dblp]
  • Jean-Luc Danger (ENST - Paris, FR) [dblp]
  • Linus Feiten (Universität Freiburg, DE) [dblp]
  • Domenic Forte (University of Florida - Gainesville, US) [dblp]
  • Fatemeh Ganji (TU Berlin, DE) [dblp]
  • Swaroop Ghosh (University of South Florida, US) [dblp]
  • Jorge Guajardo Merchan (Robert Bosch LLC - Pittsburgh, US) [dblp]
  • Tim Erhan Güneysu (Universität Bremen, DE) [dblp]
  • Sorin A. Huss (TU Darmstadt, DE) [dblp]
  • Michael Hutter (Cryptography Research Inc. - San Francisco, US) [dblp]
  • Ramesh Karri (New York University, US) [dblp]
  • Osnat Keren (Bar-Ilan University, IL) [dblp]
  • Tanja Lange (TU Eindhoven, NL) [dblp]
  • Roel Maes (Intrinsic-ID - Eindhoven, NL) [dblp]
  • Nele Mentens (KU Leuven, BE) [dblp]
  • Debdeep Mukhopadhyay (Indian Institute of Technology - Kharagpur, IN) [dblp]
  • Ruben Niederhagen (TU Eindhoven, NL) [dblp]
  • Sikhar Patranabis (Indian Institute of Technology - Kharagpur, IN) [dblp]
  • Elad Peer (CISCO Systems - Haifa, IL)
  • Ilia Polian (Universität Passau, DE) [dblp]
  • Wenjing Rao (University of Illinois - Chicago, US) [dblp]
  • Francesco Regazzoni (University of Lugano, CH) [dblp]
  • Ulrich Rührmair (Ruhr-Universität Bochum, DE) [dblp]
  • Kazuo Sakiyama (The University of Electro-Communications - Tokyo, JP) [dblp]
  • Werner Schindler (BSI - Bonn, DE) [dblp]
  • Georg Sigl (TU München, DE) [dblp]
  • Shahin Tajik (TU Berlin, DE) [dblp]
  • Mark M. Tehranipoor (University of Florida - Gainesville, US) [dblp]

Classification
  • hardware
  • security / cryptology

Keywords
  • Hardware Security
  • Cryptographic Primitives
  • Side-channel Cryptanalysis
  • Hardware Trojans
  • Physically Unclonable Functions