Full Description
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Smart Card Research and Advanced Applications, CARDIS 2017, held in Lugano, Switzerland, in November 2017.The 14 revised full papers presented together with 2 abstracts of invited talks in this book were carefully reviewed and selected from 48 submissions.
CARDIS has provided a space for security experts from industry and academia to exchange on security of smart cards and related applications.
Contents
Opening Pandora's Box: Effective Techniques for Reverse Engineering IoT Devices.- Optimal First-Order Boolean Masking for Embedded IoT Devices.- A first-order chosen plaintext DPA attack on the third round of DES.- A Strict Key Enumeration Algorithm for Dependent Score Lists of Side-Channel Attacks.- A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher.- Leakage Bounds for Gaussian Side Channels.- Towards Sound and Optimal Leakage Detection Procedure.- Connecting and Improving Direct Sum Masking and Inner Product Masking.- May The Force Be With You: Force-Based Relay Attack Detection.- Instruction Duplication: Leaky and Not Too Fault-Tolerant!.- An EM Fault Injection Susceptibility Criterion and its application to the localization of hotspots.- Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers.- Horizontal clustering side-channel attacks on embedded ECC implementations.- Trace Augmentation: What Can Be Done Even Before Preprocessing in a Pro led SCA?