Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3139324acmconferencesBook PagePublication PagesccsConference Proceedingsconference-collections
ASHES '17: Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security
ACM2017 Proceeding
  • Program Chairs:
  • Chip Hong Chang,
  • Ulrich Rührmair,
  • Publications Chair:
  • Wei Zhang
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security Dallas Texas USA 3 November 2017
ISBN:
978-1-4503-5397-7
Published:
03 November 2017
Sponsors:
Next Conference
October 14 - 18, 2024
Salt Lake City , UT , USA
Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the First Workshop on Attacks and Solutions in Hardware Security 2017 (ASHES 2017), a post-conference satellite workshop of the ACM Conference on Computer and Communications Security 2017 (CCS 2017) in Dallas!

ASHES deals with all aspects of hardware security, and welcomes any contributions to this area. Besides being a forum for mainstream hardware security research, its mission is to specifically foster new concepts, solutions, and methodological approaches, and to promote new application scenarios, within the field. This includes, for example, new attack vectors on secure hardware, the merger of nanotechnology and hardware security, novel designs and materials, lightweight security hardware, and physical unclonable functions (PUFs) on the methodological side, as well as the internet of things, automotive security, smart homes, supply chain security, pervasive and wearable computing on the applications side. ASHES thereby aims at giving researchers and practitioners a unique opportunity to share their perspectives with others on various new and emerging aspects of hardware security.

In order to account for the nature of hardware security as a rapidly developing discipline, ASHES offers four categories of submissions and papers:

  • Full papers

  • Short papers

  • Systematization of Knowledge (SoK) papers, which structure or survey a certain subarea within hardware security

  • Wild and Crazy (WaC) papers, whose aim is to distribute a promising and potentially seminal research idea at an early stage to the community.

Our call for papers attracted overall 20 submissions from Australia (1), Asia (2), Canada (1), Europe (6), India (1), and the United States (9) within these four categories.

Six submissions were accepted as papers to the program, amounting to an acceptance rate of exactly 30%. Out of these six accepted papers, two originate from Europe, and four from the United States.

In terms of their scientific topics,

  • two of the six accepted papers deal with solutions in hardware security;

  • one each falls into the above SoK- and WaC-paper categories;

  • and two others deal with attacks on security hardware.

This establishes a nice balance between the different themes and paper categories offered by the workshop.

The six technical papers are complemented by three carefully chosen keynotes from leading experts in their respective areas, to which we would particularly draw the attendees' attention.

In alphabetical order:

  • Srini Devadas (MIT) will talk about "Secure Hardware and Cryptography: Contrasts, Synergies and Challenges"

  • Ulfar Erlingsson (Google) will deal with "Data-driven Software Security and its Hardware Support"

  • Ahmad-Reza Sadeghi (Darmstadt) will discuss "Hardware-Assisted Security: Promises, Pitfalls and Opportunities"

Skip Table Of Content Section
SESSION: Keynote Addresses
invited-talk
Secure Hardware and Cryptography: Contrasts, Synergies and Challenges

Numerous cryptographic protocols and mechanisms have been developed to solve computer security challenges, and these techniques vary considerably with respect to security assumptions, performance tradeoffs, and applicability to problems. Secure hardware ...

invited-talk
Data-driven Software Security and its Hardware Support

For computer software, our security models, policies, mechanisms, and means of assurance were primarily conceived and developed before the end of the 1970's. However, since that time, software has changed radically: it is thousands of times larger, ...

invited-talk
Hardware-Assisted Security: Promises, Pitfalls and Opportunities

Hardware security architectures and primitives are becoming increasingly important in practice providing trust anchors and trusted execution environment to protect modern IT systems, and particularly secure the insecure legacy software. Emerging ...

SESSION: Paper Session: Solutions in Hardware Security
research-article
Public Access
Boolean Circuit Camouflage: Cryptographic Models, Limitations, Provable Results and a Random Oracle Realization

Recent hardware advances, called gate camouflaging, have opened the possibility of protecting integrated circuits against reverse-engineering attacks. In this paper, we investigate the possibility of provably boosting the capability of physical ...

research-article
Public Access
Optimizing Cryptography in Energy Harvesting Applications

The Internet of Things will need to support ubiquitous and continuous connectivity to resource constrained and energy constrained devices. To this end, we consider the optimization of cryptographic protocols under energy harvesting conditions. ...

SESSION: Paper Session: WaC & SoK
research-article
WaC: SpaceTEE - Secure and Tamper-Proof Computing in Space using CubeSats

Sensitive computation often has to be performed in a trusted execution environment (TEE), which, in turn, requires tamper-proof hardware. If the computational fabric can be tampered with, we may no longer be able to trust the correctness of the ...

research-article
SoK: RFID-based Clone Detection Mechanisms for Supply Chains

Clone product injection into supply chains causes serious problems for industry and customers. Many mechanisms have been introduced to detect clone products in supply chains which make use of RFID technologies. This article gives an overview of these ...

SESSION: Paper Session: Attacks in Hardware Security
research-article
EM Side-Channel Analysis of BCH-based Error Correction for PUF-based Key Generation

Physical Unclonable Functions (PUFs) provide a cost-efficient way to store a secure key on a device. But the noisy secret from a PUF must be corrected to generate a stable key. Since the error correction processes secret material, it is a target of ...

short-paper
On Feasibility and Performance of Rowhammmer Attack

In this paper we study the Rowhammer sidechannel attack and evaluate its feasibility on practical exploitation scenarios in Linux. Currently, all the implementations released, capable of performing the Rowhammer attack, require elevated privileges. This ...

Contributors
  • Nanyang Technological University
  • Technical University of Berlin

Index Terms

  1. Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Acceptance Rates

      ASHES '17 Paper Acceptance Rate6of20submissions,30%Overall Acceptance Rate6of20submissions,30%
      YearSubmittedAcceptedRate
      ASHES '1720630%
      Overall20630%