skip to main content
10.1145/3031836acmotherconferencesBook PagePublication Pagescs2Conference Proceedingsconference-collections
CS2 '17: Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems
ACM2017 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CS2 '17: Cryptography and Security in Computing Systems Stockholm Sweden 24 January 2017
ISBN:
978-1-4503-4869-0
Published:
24 January 2017
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 03 Feb 2025Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
research-article
Reliable low-overhead arbiter-based physical unclonable functions for resource-constrained IoT devices

Physical unclonable functions (PUFs) are promising hardware security primitives suitable for resource-constrained devices requiring lightweight cryptographic methods. However, PUF responses frequently suffer from instability due to varying environmental ...

research-article
Side-channel leakage aware instruction scheduling

Speed-optimized side-channel protected software implementations of block ciphers are important for the security of embedded IoT devices based on general-purpose microcontrollers. The recent work of Schwabe et al. published at SAC 2016 introduced a bit-...

research-article
Large scale characterization of SRAM on infineon XMC microcontrollers as PUF

SRAM-based physical unclonable functions (SRAM PUFs) derive a device dependent secret from the start-up pattern of their memory cells and have shown very promising results in previous publications. This work presents a dataset measured on 144 Infineon ...

research-article
Multi-core data analytics SoC with a flexible 1.76 Gbit/s AES-XTS cryptographic accelerator in 65 nm CMOS

Embedded systems for Internet-of-Things applications present new challenges to system design. From a hardware design perspective, energy efficiency is paramount, as most of devices have a limited power supply due to size considerations. Transmitting ...

short-paper
TrustZone-backed bitcoin wallet

With the increasing popularity of virtual currencies, it has become more important to have highly secure devices in which to store private-key information. Furthermore, ARM has made available an extension of processors architectures, designated ...

short-paper
Filtering-based CPA: a successful side-channel attack against desynchronization countermeasures

Secure implementations against side channel attacks usually combine hiding and masking protections in software implementations. In this work, we focus on desynchronization protection which is considered as a hiding countermeasure. The idea of ...

Contributors
  • University of Luxembourg
  • Politecnico di Milano
  • Politecnico di Milano
  • Politecnico di Milano
Index terms have been assigned to the content through auto-classification.

Recommendations

Acceptance Rates

CS2 '17 Paper Acceptance Rate 4 of 11 submissions, 36%;
Overall Acceptance Rate 27 of 91 submissions, 30%
YearSubmittedAcceptedRate
CS2 '188225%
CS2 '1711436%
CS2 '16191053%
CS2 '1527519%
CS2 '1426623%
Overall912730%