Upcoming Conferences and Workshops:
Secure Design Strategies for Intelligent CPUs Workshop (co-organized)
May 10, 2020 | Zagreb, Croatia
Organizers: Nele Mentens (KU Leuven) and Ahmad-Reza Sadeghi (CROSSING, TU Darmstadt)
Almost all computing systems, from high-performance servers to tiny sensor nodes, are controlled by a Central Processing Unit (CPU). In the past years, it became clear that the security of CPUs needs to be taken into account during the entire design process, from the design of the low-level hardware components to the high-level CPU architecture. Researchers are taking on the challenging task of analyzing security vulnerabilities and proposing subsequent solutions, keeping in mind the importance of high performance and low power consumption.
Furthermore, machine learning applications will have an important influence on future CPU architectures and accelerators, and must be taken into account when performing security evaluations and developing protection mechanisms.
This workshop will cover the most recent findings in CPU vulnerabilities and mitigation techniques. The talks in the session are given by renowned speakers from industry and academia. A panel discussion will trigger the audience to follow new research directions in the design of secure and intelligent CPUs.
Workshop website: https://www.esat.kuleuven.be/cosic/events/secsi2020/
Theory and Practice of Multi-Party Computation Workshops
May 25 – 28, 2020 | Aarhus, Denmark
Organizers: Ivan Damgård (Aarhus University), Yehuda Lindell (Bar-Ilan University), Carmit Hazay (Bar-Ilan University), Jesper Buus Nielsen (Aarhus University), Claudio Orlandi (Aarhus University), Mike Rosulek (Oregon State University), Thomas Schneider (TU Darmstadt), and Nigel P. Smart (KU Leuven)
Supported by CROSSING
The TPMPC workshop aims to bring together practitioners and theorists working in multi-party computation.
Secure Multi-Party Computation is a powerful cryptographic notion that – in theory – can solve virtually any cryptographic protocol problem. In recent years the technology has been used in practice and holds great promise for future applications.
MPC technology can be used to implement, for instance, voting, auctions, procurement and benchmarking with better security, in particular without anyone having to reveal his private data to anyone else.
The TPMPC workshops bring together people in both theory and practice of the field, and we are convinced that this will prove very productive. Leading researchers in the field will present their latest results in secure computation.
The workshop is open for all participants, the target audience is PhD students, postdocs and faculty members.
The TPMPC workshops continue a tradition of workshops started in Aarhus, Denmark in 2012. TPMPC is a yearly event, the current plan is to have it in Aarhus in even years and in another location in odd years.
CROSSING-PI Prof. Thomas Schneider is a member of the TPMPC Organizing Committee.
Workshop website: https://www.multipartycomputation.com/
Hardware Security Contest at DAC and USENIX
DAC: July 19-23, 2020 | USENIX: August 12-14, 2020
Organizer: Ahmad-Reza Sadeghi (CROSSING, TU Darmstadt)
The recent outbreak of microarchitectural attacks that are being continuously uncovered has shown us the hard way that our trust assumptions in the underlying hardware of our computing systems and security architectures are unjustified. Besides microarchitectural design flaws, System-on-Chip (SoC) designers often use third-party intellectual property (3PIP) cores and in-house IP cores to design their SoCs. Trustworthiness of such SoCs can be undermined by security bugs unintentionally introduced during the implementation and integration of these IPs. Each SoC has its own defined usage scenario and corresponding security objectives. When exploited, a security weakness often results in compromise or bypass of at least one of the product security objectives. As we have already witnessed, attacks may lead to a system failure or deadlock , or generate a side channel to remotely access sensitive information (e.g., cryptographic keys), or gain privileged access to the system enabling them to bypass the security mechanisms in place and compromise the whole computing platform.
The goal of this competition in its third edition in a row is to develop practical and effective solutions and computer-aided tools to identify such vulnerabilities more efficiently in buggy SoC, with a special focus on theory, tooling, and automation.
Workshop website: https://hackat.events/