TIS'19: Theory of implementation security workshop 2019

0Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this workshop, we focus on physical attacks and their countermeasures. With the advent of the Internet of Things, the interest in embedded cryptographic systems and physical attacks on these systems is steadily increasing, both in academia and industry. Sophisticated security certification and evaluation methods have been established to give assurance about the security claims by independent evaluation and testing. The certification has a drawback that it is time consuming and expensive. There is a need for further developing provably secure protection methods and automated verification tools, but also improving the efficiency and quality of certification by integrating these tools and methods. All these challenges motivate even more research on the Theory of Implementation Security.

Cite

CITATION STYLE

APA

Bilgin, B., Nikova, S., & Rijmen, V. (2019). TIS’19: Theory of implementation security workshop 2019. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 2701–2702). Association for Computing Machinery. https://doi.org/10.1145/3319535.3353552

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free