[HGI-news-int] SECSI 2010 - Secure Component and System Identification

English Newsletter of the Horst Goertz Institute of IT Security in Bochum hgi-news-international at lists.ruhr-uni-bochum.de
Thu Apr 15 14:59:34 CEST 2010


we apologize for multiple mailings. Christof Paar

======================================================


             CALL FOR PARTICIPATION

SECSI 2010 - Secure Component and System Identification
www.secsi-workshop.org
April 26-27, 2010
Cologne, Germany

The program is now available on the workshop website and in text form below.

For registration and all other information, please also visit the
workshop website.

Regards, Christof Paar and Pim Tuyls



                === PROGRAM SECSI 2010 ===

Monday, April 26

Anticounterfeiting – Legal and System Issues

9:30 – 10:30  Counterfeiting in cyberspace, the legal context
Patrick van Eecke, University of Antwerp

10:30 – 11:10 RFID-Based Secure Product Authentication for Counterfeit Detection
Andre Osterhues,  escrypt – Embedded Security

Reverse Engineering 1

11:40-12:40 Voltage Contrast to image voltage states: Opportunities and limitations
John Walker, Siventure

PUF Technologies 

14:00-14:40  Software Techniques to Combat Drift in PUF-based Authentication Systems
Michael S. Kirkpatrick, Elisa Bertino
Purdue University

14:40-15:10 Design Optimization and Security Validation of Sub-Threshold PUFs
Lang Lin, Dan Holcomb, Dilip Kumar Krishnappa, Prasad Shabadi, Wayne Burleson
University of Massachusetts Amherst, University of California at Berkeley

15:40-16:20 An Alternative to Error Correction for SRAM-Like PUFs
Hofer and Boehm
TU-Graz and Infineon

Reverse Engineering 2 

16:20-17:20  Automotives vs. Security
Karsten Nohl,	Security Research Labs


19:00 Workshop Banquet in the Museum Ludwig 



Tuesday, April 27

Secure ASICs

9:00-10:00 Practical Anti-Counterfeiting Techniques for High-Threat Environments
Ben Levine, Cryptographic Research
	
New Primitives for Anticounterfeiting and Privacy

10:00– 10:40 Side-Channel Based Watermarks for Integrated Circuits
Georg T. Becker, Markus Kasper, Amir Moradi, Christof Paar
Ruhr University Bochum, University of Massachusetts Amherst

11:10-12: 00 Memory Leakage-Resilient Encryption based on Physically Unclonable Functions 
Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, Berk Sunar, Pim Tuyls
Ruhr-University Bochum, Catholic University of Leuven, WPI, Intrinsic ID 

12:00-12:40 PUF-Enhanced RFID Security and Privacy
Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann
Ruhr-University Bochum and University of Salerno

Secure Tokens

13:30-14:30  Smart Card Security - Is there light at the end of the tunnel?
Matthias Wagner, NXP   

Panel Discussion (Chair: Pim Tuyls)
14:30-15:50  Is there a business model for anticounterfeiting?	

15:50 Closing remarks 

16:00 Adjourn	

-- 
=====================================================================
                     www.crypto-textbook.com 

Understanding Cryptography -- A Textbook for Students and Practioners

by Christof Paar and Jan Pelzl, Springer, December 2009
=====================================================================





More information about the HGI-News-International mailing list