In the framework of CSAW Europe 23, the LCIS lab and Grenoble INP Esisar invite you to a research conference on November 9th 2023. The conference will take place in Grenoble INP Esisar at Valence. While the first part of the day will be dedicated to a seminar on PUF enabled Security, the afternoon will focus on the CSAW 23 Applied Research competition giving the stage to the finalists so that they can present to the audience their paper selected for the final. The detailed program of the day can be found here with the references of the papers which will presented at the Applied Research competitions.








csaw2023



Program of the day :

  •  Matinée Thématique avec le GT sécurité des systèmes matériels, commun aux GDR Sécurité Informatique et SOC2: PUF-Enabled System Security (9:30 – 12:30)

    •  Methodologies for verification and quality assessment of Physical Unclonable FunctionsDr. Sergio Vinagrero, TIMA

    •  PHASEPUF: PHotonic Augmented SEcurity via Physical Unclonable FunctionsDr. Fabio Pavanello, IMEP-LAHC, 

    •  Innovative dynamic SRAM PUF authentication for trusted internet of thingsPr. Pascal Urien, Telecom Paris 

    •  Finalists presentations of the PUF-enabled Security Challenge de CSAW23

       

  •  Applied Research  (14:00-17:30)

    •   SoK: Taxonomy of Attacks on Open-Source Software Supply Chains, Piergiorgio Ladisa, SAP Security Research & Université de Rennes 1, Inria, IRISA

    •   ClepsydraCache -- Preventing Cache Attacks with Time-Based Evictions, Niesler Christian & Jan Thoma, University of Duisburg-Essen & Ruhr University Bochum

    •   LibAFL: A Framework to Build Modular and Reusable Fuzzers, Andrea Fioraldi, Eurecom

    •   It's (DOM) Clobbering Time: Attack Techniques, Prevalence, and Defenses, Soheil Khodayari, CISPA Helmholtz Center for Information Security

    •   A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs, Gerlach Lukas, Helmholtz Center for Information Security

    •   RiscyROP: Automated Return-Oriented Programming Attacks on RISC-V and ARM64, Cloosters Tobias University of Duisburg-Essen

    •   Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js, Mikhail Shcherbakov, KTH Royal Institute of Technology

    •   ShowTime: Amplifying Arbitrary CPU Timing Side Channels, Bognar Marton, KU Leuven

    •   NatiSand: Native Code Sandboxing for JavaScript Runtimes, Matthew Rossi, Università degli studi di Bergamo

    •   Why So Toxic? Measuring and Triggering Toxic Behavior in Open-Domain Chatbots,Wai Man Si, CISPA Helmholtz Center for Information Security.

Published on October 5, 2023