
Program of the day :
-
Matinée Thématique avec le GT sécurité des systèmes matériels, commun aux GDR Sécurité Informatique et SOC2: PUF-Enabled System Security (9:30 – 12:30)
-
Methodologies for verification and quality assessment of Physical Unclonable Functions, Dr. Sergio Vinagrero, TIMA
-
PHASEPUF: PHotonic Augmented SEcurity via Physical Unclonable Functions, Dr. Fabio Pavanello, IMEP-LAHC,
-
Innovative dynamic SRAM PUF authentication for trusted internet of things, Pr. Pascal Urien, Telecom Paris
-
Finalists presentations of the PUF-enabled Security Challenge de CSAW23
-
-
Applied Research (14:00-17:30)
-
SoK: Taxonomy of Attacks on Open-Source Software Supply Chains, Piergiorgio Ladisa, SAP Security Research & Université de Rennes 1, Inria, IRISA
-
ClepsydraCache -- Preventing Cache Attacks with Time-Based Evictions, Niesler Christian & Jan Thoma, University of Duisburg-Essen & Ruhr University Bochum
-
LibAFL: A Framework to Build Modular and Reusable Fuzzers, Andrea Fioraldi, Eurecom
-
It's (DOM) Clobbering Time: Attack Techniques, Prevalence, and Defenses, Soheil Khodayari, CISPA Helmholtz Center for Information Security
-
A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs, Gerlach Lukas, Helmholtz Center for Information Security
-
RiscyROP: Automated Return-Oriented Programming Attacks on RISC-V and ARM64, Cloosters Tobias University of Duisburg-Essen
-
Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js, Mikhail Shcherbakov, KTH Royal Institute of Technology
-
ShowTime: Amplifying Arbitrary CPU Timing Side Channels, Bognar Marton, KU Leuven
-
NatiSand: Native Code Sandboxing for JavaScript Runtimes, Matthew Rossi, Università degli studi di Bergamo
-
Why So Toxic? Measuring and Triggering Toxic Behavior in Open-Domain Chatbots,Wai Man Si, CISPA Helmholtz Center for Information Security.
-