![]() |
![]() |
Submission Due: | September 14, 2022 |
Notification: | October 20, 2022 |
Camera-ready Version: | October 30, 2022 |
Conference: | December 9-12, 2022 |
Submission Link |
Visa to India |
Registration link |
December 09, 2022 (DAY 1: 8:30 AM to 7:15 PM IST) | |
---|---|
8:30-9:00 | Welcome Note |
09:00-10:30 | Tutorial 1 Zero-Knowledge Proofs in Practice: Demystifying Blockchain Rollups Dr. Sikhar Patranabis, Dr. Nitin Singh, IBM Research Chair: Mainack Mondal, IIT Kharagpur |
10:30-11:00 | Break |
11:00- 12:30 | Tutorial 1 (continued) Zero-Knowledge Proofs in Practice: Demystifying Blockchain Rollups Dr. Sikhar Patranabis, Dr. Nitin Singh, IBM Research Chair: Mainack Mondal, IIT Kharagpur |
12:30- 14:00 | Lunch |
14:00- 15:30 | TUTORIAL - 2
Attacking Real-World Crypto With Side-Channel Analysis Łukasz Chmielewski, Radboud University, The Netherlands Chair: Chester Rebeiro, IIT Madras |
15:30- 16:00 | Break |
16:00- 17:30 | TUTORIAL - 2 (continued)
Attacking Real-World Crypto With Side-Channel Analysis Łukasz Chmielewski, Radboud University, The Netherlands Chair: Chester Rebeiro, IIT Madras |
17:30- 17:45 | Tea Break |
17:45- 18:45 | KEYNOTE TALK - 1 Security Challenges in Internet of Things (IoT) and Cyber Physical Systems (CPS) Prof. Sanjay K Jha, UNSW Sydney, Australia Chair: Jayaprakash Kar, LMNIT Jaipur |
18:45- 19:15 | High Tea | Dec 10 2022: Day 2 |
9:00-10:00 | Conference opening |
10:00-11:00 | KEYNOTE TALK - 2
Title: Hardware: an essential partner to cryptography Prof. Ingrid Verbauwhede, KU Leuven, Belgium Chair: Debdeep Mukhopdhyay, IIT Kharagpur, India |
11:00- 11:30 | Break |
11:30- 13:00 | PAPER SESSION - 1:Symmetric Cryptography 1 Chair: Ingrid Verbauwhede, KU Leuven, Belgium - Modeling Large S-box in MILP and a (Related-key) Differential Attack on Full Round PIPO-64/128 Tarun Yadav and Manoj Kumar (Scientific Analysis Group, DRDO, India) - Light but Tight: Lightweight Composition of Serialized S-Boxes with Diffusion Layers for Strong Ciphers Rajat Sadhukhan, Anirban Chakraborty, Nilanjan Datta, Sikhar Patranabis and Debdeep Mukhopadhyay (IIT Kharagpur, India / IAI, TCG Crest, India / IBM Re-search, India) - Big Brother Is Watching You: A Closer Look At Backdoor Construction 76 |
13:00- 14:00 | Lunch |
14:00-15:00 | KEYNOTE TALK - 3
Title: Towards Secure Computing Systems Prof. Chester Rebeiro, IIT Madras, India Chair: Mainack Mondal, IIT Kharagpur |
15:00- 16:00 | PAPER SESSION - 2: Network Security Chair: Łukasz Chmielewski, Radboud University, The Netherlands - An analysis of the hardware-friendliness of AMQ data structures for network security Arish Sateesan, Jo Vliegen and Nele Mentens (imec-COSIC/ES&S, ESAT, KU Leuven, Belgium / LIACS, Leiden University, The Netherlands) - RemOD: Operational Drift-adaptive Intrusion Detection Vikas Maurya, Nanda Rani and Sandeep Shukla (IIT Kanpur, India) |
16:00- 16:30 | Break |
16:30-18:00 | PAPER SESSION - 3: Hardware security and physical attacks Chair: Łukasz Chmielewski, Radboud University, The Netherlands - How Many Cameras Do You Need? Adversarial Attacks and Countermeasures for Robust Perception in Autonomous Vehicles Tu A. Ngo, Reuben J. Chia, Jonathan Chan, Nandish Chattopadhyay and Anupam Chattopadhyay (NTU Singapore, Singapore) - Protecting the most significant bits in scalar multiplication algorithms Estuardo Alpirez Bock, Lukasz Chmielewski and Konstantina Miteloudi (Aalto University, Finland / Masaryk University, Czech Republic / Radboud University, Nijmegen, The Netherlands - What Do You See? Transforming Fault Injection Target Characterizations Marina Krček (Delft University of Technology, The Netherlands) Anubhab Baksi, Arghya Bhattacharjee, Jakub Breier, Takanori Isobe and Mridul Nandi (NTU Singapore, Singapore / ISI Kolkata, India / Silicon Austria Labs, Graz, Austria / University of Hyogo, Kobe |
18:00-18:30 | High Tea | Dec 11 2022: Day 3 |
9:00-10:00 | PAPER SESSION - 4: Symmetric Cryptography 2 Chair: Nele Mentens, KU Leuven, Belgium - Bias Cancellation of MixColumns Subhadeep Banik, Andrea Caforio, Kostas Papagiannopoulos and Francesco Re-gazzoni (Universita della Svizzera Italiana, Lugano, Switzerland / LASEC, Ecole Polytechnique Fédérale de Lausanne, Switzerland / University of Amsterdam, The Netherlands) - Hardware Implementation of Masked SKINNY SBox with Application to AEAD Mustafa Khairallah and Shivam Bhasin (NTU Singapore, Singapore / Seagate research, Singapore) |
10:00-11:00 | KEYNOTE TALK - 4 Title: Building Secure Systems Bottom Up: Hunting down hardware security vulnerabilities Prof. Jeyavijayan (JV) Rajendran, TAMU, USA Chair: Stjepan Picek, Radboud University in Nijmegen, the Netherlands |
11:00-11:30 | Break |
11:30- 13:00 | PAPER SESSION - 5: Public-key Cryptography, Post-quantum Cryptography, Zero Knowledge Proofs Chair: Stjepan Picek, Radboud University in Nijmegen, the Netherlands - KEMTLS vs. Post-Quantum TLS: Performance on Embedded Systems Ruben Gonzalez and Thom Wiggers (Neodyme AG, Garching, Germany / Radboud University, Nijmegen, The Netherlands) - Combining Montgomery Multiplication with Tag Tracing for the Pollard ' s Rho Algorithm in Prime Order Fields Madhurima Mukhopadhyay and Palash Sarkar (IIT Kanpur, India / ISI Kolkata, India) - Card-based zero-knowledge proof for the nearest neighbor property: Zero-knowledge proof of ABC end view Takuro Fukasawa and Yoshifumi Manabe (Kogakuin University, Shinjuku,Tokyo, Japan) |
13:00- 14:00 | Lunch |
14:00- 15:00 | KEYNOTE TALK - 5
Title: TBD Prof. Nele Mentens, KU Leuven, Belgium Chair: Lejla Batina, Radboud University in Nijmegen, the Netherlands |
15:00 - 16:00 | PAPER SESSION - 6: Authentication and privacy Chair: Mainack Mondal, IIT Kharagpur - SMarT: A SMT based Privacy Preserving Smart Meter Streaming Methodology Soumyadyuti Ghosh, Soumyajit Dey and Debdeep Mukhopadhyay (IIT Kharagpur, India) - A short note on a paper titled A Delaunay Quadrangle-Based Fingerprint Authentica-tion System with Template Protection using Topology Code for local registration and security enhancement SrinivasaRao SubramanyaRao (Cybersecurity Researcher and Consultant, Can-berra, Australia) |
16:00- 16:30 | Break |
16:00- 17:30 | Poster Session
Poster Chair: Prof. Chester Rebeiro |
16:30-17:30 | PAPER SESSION - 7: Side-channel analysis and AI Chair: Łukasz Chmielewski - Dual-Tone Multi-Frequency Assisted Acoustic Side Channel Attack to Retrieve Dialled Call Log Abhishek Revskar, Mahendra Rathor and Urbi Chatterjee (IIT Kanpur, India) - Machine Learning Attacks on Low-Cost Reconfigurable XRRO and XRBR PUF Designs Manthan Kojage, Neelofar Hassan and Urbi Chatterjee (IIT Kanpur, India) - HWGN2: Side-channel Protected NNs through Secure and Private Function Evalua-tion Mohammad Hashemi, Steffi Roy, Domenic Forte and Fatemeh Ganji (Worcester Polytechnic Institute, MA, USA / University of Florida, Florida, USA) |
18:30-19:00 | High Tea |
19:00 onwards | Banquet dinner | Dec 12 2022: Day 4 |
09:00-10:30 | TUTORIAL – 3
Implementing Kyber and Dilithium Dr. Matthias Kannwischer, Academica Sinica Taiwan Chair: Lejla Batina, Radboud University in Nijmegen, the Netherlands |
10:30-11:00 | Break |
11:00- 12:30 | TUTORIAL – 3 (continued)
Implementing Kyber and Dilithium Dr. Matthias Kannwischer, Academica Sinica Taiwan Chair: Lejla Batina, Radboud University in Nijmegen, the Netherlands |
12:30- 14:00 | Lunch |
14:00- 15:30 | TUTORIAL – 4
Title: Profiling Side-channel Analysis: From Template Attack to Deep Learning Prof. Stjepan Picek, Prof. Lejla Batina, Radboud University, The Netherlands |
15:30- 16:00 | Break |
16:00- 17:30 | TUTORIAL – 4 (continued)
Title: Profiling Side-channel Analysis: From Template Attack to Deep Learning Prof. Stjepan Picek, Prof. Lejla Batina, Radboud University, The Netherlands |
17:30- 18:00 | Concluding Remarks |
18:00- 18:30 | High Tea |