Abbrevation
COSADE
City
Darmstadt
Country
Germany
Deadline Paper
Start Date
End Date
Abstract

Side&#8211;channel analysis (SCA) and implementation attacks have become an important field of research at universities and in the industry&#046; In order to enhance the resistance of cryptographic and security critical implementations within the design phase, constructive attacks and analyzing techniques may serve as a quality metric to optimize the design and development process&#046; Since 2010, COSADE provides an international platform for researchers, academics, and industry participants to present their work and their current research topics&#046;<br>In 2019, the International Workshop on Constructive Side&#8211;Channel Analysis and Secure Design celebrates its 10 th anniversary and is held by TU Darmstadt, Darmstadt, Germany&#046; The program committee is seeking original papers on all aspects of the side –channel analysis and other implementation attacks as well as secures design&#046; Submission topics of interest include,<br>Implementation attacks and exploitations:<br>Side&#8211;channel analysis, fault&#8211;injection attacks, probing and read&#8211;out, hardware Trojans, cloning and counterfeiting, side&#8211;channel or fault&#8211; injection based reverse engineering<br>Secure implementation:<br>Cryptographic blocks (including post&#8211;quantum and lightweight ciphers), random number generators, physical unclonable functions, leakage&#8211; resilient cryptography, fault&#8211;injection tolerant design, and tamper&#8211;detection<br>Implementation attack&#8211;resilient architectures and schemes:<br>Trusted environment (Secure boot, execution, storage, isolation, virtualization, firmware update), protections against micro&#8211;architectural side&#8211;channels and covert channels, cache attacks, software&#8211;enabled implementation attacks, white&#8211;box cryptography<br>Secure design and evaluation:<br>Security and leakage models, formal analysis of secure implementations, design automation and tools, evaluation tooling, domain&#8211;specific security analysis of e&#046;g&#046;, IoT, medical, automotive, industrial&#8211;control systems, mobile, security analysis based on artificial intelligence<br>