Abstract
In this workshop, we focus on physical attacks and their countermeasures. With the advent of the Internet of Things, the interest in embedded cryptographic systems and physical attacks on these systems is steadily increasing, both in academia and industry. Sophisticated security certification and evaluation methods have been established to give assurance about the security claims by independent evaluation and testing. The certification has a drawback that it is time consuming and expensive. There is a need for further developing provably secure protection methods and automated verification tools, but also improving the efficiency and quality of certification by integrating these tools and methods. All these challenges motivate even more research on the Theory of Implementation Security.
Author supplied keywords
Cite
CITATION STYLE
Bilgin, B., Nikova, S., & Rijmen, V. (2019). TIS’19: Theory of implementation security workshop 2019. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 2701–2702). Association for Computing Machinery. https://doi.org/10.1145/3319535.3353552
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.