- Sponsor:
- sigsac
It is our great pleasure to welcome you to the First Workshop on Attacks and Solutions in Hardware Security 2017 (ASHES 2017), a post-conference satellite workshop of the ACM Conference on Computer and Communications Security 2017 (CCS 2017) in Dallas!
ASHES deals with all aspects of hardware security, and welcomes any contributions to this area. Besides being a forum for mainstream hardware security research, its mission is to specifically foster new concepts, solutions, and methodological approaches, and to promote new application scenarios, within the field. This includes, for example, new attack vectors on secure hardware, the merger of nanotechnology and hardware security, novel designs and materials, lightweight security hardware, and physical unclonable functions (PUFs) on the methodological side, as well as the internet of things, automotive security, smart homes, supply chain security, pervasive and wearable computing on the applications side. ASHES thereby aims at giving researchers and practitioners a unique opportunity to share their perspectives with others on various new and emerging aspects of hardware security.
In order to account for the nature of hardware security as a rapidly developing discipline, ASHES offers four categories of submissions and papers:
Full papers
Short papers
Systematization of Knowledge (SoK) papers, which structure or survey a certain subarea within hardware security
Wild and Crazy (WaC) papers, whose aim is to distribute a promising and potentially seminal research idea at an early stage to the community.
Our call for papers attracted overall 20 submissions from Australia (1), Asia (2), Canada (1), Europe (6), India (1), and the United States (9) within these four categories.
Six submissions were accepted as papers to the program, amounting to an acceptance rate of exactly 30%. Out of these six accepted papers, two originate from Europe, and four from the United States.
In terms of their scientific topics,
two of the six accepted papers deal with solutions in hardware security;
one each falls into the above SoK- and WaC-paper categories;
and two others deal with attacks on security hardware.
This establishes a nice balance between the different themes and paper categories offered by the workshop.
The six technical papers are complemented by three carefully chosen keynotes from leading experts in their respective areas, to which we would particularly draw the attendees' attention.
In alphabetical order:
Srini Devadas (MIT) will talk about "Secure Hardware and Cryptography: Contrasts, Synergies and Challenges"
Ulfar Erlingsson (Google) will deal with "Data-driven Software Security and its Hardware Support"
Ahmad-Reza Sadeghi (Darmstadt) will discuss "Hardware-Assisted Security: Promises, Pitfalls and Opportunities"
Proceeding Downloads
Secure Hardware and Cryptography: Contrasts, Synergies and Challenges
Numerous cryptographic protocols and mechanisms have been developed to solve computer security challenges, and these techniques vary considerably with respect to security assumptions, performance tradeoffs, and applicability to problems. Secure hardware ...
Data-driven Software Security and its Hardware Support
For computer software, our security models, policies, mechanisms, and means of assurance were primarily conceived and developed before the end of the 1970's. However, since that time, software has changed radically: it is thousands of times larger, ...
Hardware-Assisted Security: Promises, Pitfalls and Opportunities
Hardware security architectures and primitives are becoming increasingly important in practice providing trust anchors and trusted execution environment to protect modern IT systems, and particularly secure the insecure legacy software. Emerging ...
Boolean Circuit Camouflage: Cryptographic Models, Limitations, Provable Results and a Random Oracle Realization
Recent hardware advances, called gate camouflaging, have opened the possibility of protecting integrated circuits against reverse-engineering attacks. In this paper, we investigate the possibility of provably boosting the capability of physical ...
Optimizing Cryptography in Energy Harvesting Applications
The Internet of Things will need to support ubiquitous and continuous connectivity to resource constrained and energy constrained devices. To this end, we consider the optimization of cryptographic protocols under energy harvesting conditions. ...
WaC: SpaceTEE - Secure and Tamper-Proof Computing in Space using CubeSats
Sensitive computation often has to be performed in a trusted execution environment (TEE), which, in turn, requires tamper-proof hardware. If the computational fabric can be tampered with, we may no longer be able to trust the correctness of the ...
SoK: RFID-based Clone Detection Mechanisms for Supply Chains
Clone product injection into supply chains causes serious problems for industry and customers. Many mechanisms have been introduced to detect clone products in supply chains which make use of RFID technologies. This article gives an overview of these ...
EM Side-Channel Analysis of BCH-based Error Correction for PUF-based Key Generation
Physical Unclonable Functions (PUFs) provide a cost-efficient way to store a secure key on a device. But the noisy secret from a PUF must be corrected to generate a stable key. Since the error correction processes secret material, it is a target of ...
On Feasibility and Performance of Rowhammmer Attack
In this paper we study the Rowhammer sidechannel attack and evaluate its feasibility on practical exploitation scenarios in Linux. Currently, all the implementations released, capable of performing the Rowhammer attack, require elevated privileges. This ...
Index Terms
- Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
ASHES '17 | 20 | 6 | 30% |
Overall | 20 | 6 | 30% |