ACM Conference on Computer and Communications Security

CCS 2017 - Papers on Hardware and architecture security

Topics · Papers

Hardware and architecture security

A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components
Vasilios Mavroudis (University College London), Andrea Cerulli (University College London), Petr Svenda (Masaryk University), Dan Cvrcek (EnigmaBridge), Dusan Klinec (EnigmaBridge), George Danezis (University College London)
The Return of Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli
Matus Nemec (Masaryk University / Ca’ Foscari University of Venice), Marek Sys (Masaryk University), Petr Svenda (Masaryk University), Dusan Klinec (Masaryk University / EnigmaBridge), Vashek Matyas (Masaryk University)
(Award Finalist)
[PDF]
[Artifact]
Session: 1H
Full accounting for verifiable outsourcing
Riad S. Wahby (Stanford University), Ye Ji (New York University), Andrew J. Blumberg (University of Texas at Austin), abhi shelat (Northeastern University), Justin Thaler (Georgetown University), Michael Walfish (New York University), Thomas Wies (New York University)
May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519
Daniel Genkin (University of Pennsylvania / University of Maryland), Luke Valenta (University of Pennsylvania), Yuval Yarom (University of Adelaide / Data61)
DolphinAttack: Inaudible Voice Commands
Guoming Zhang (Zhejiang University), Chen Yan (Zhejiang University), Xiaoyu Ji (Zhejiang University), Tianchen Zhang (Zhejiang University), Taimin Zhang (Zhejiang University), Wenyuan Xu (Zhejiang University)
(Award Finalist)
[PDF]
[Paper]
Session: 3A
Provably-Secure Logic Locking: From Theory To Practice
Muhammad Yasin (New York University), Abhrajit Sengupta (New York University), Mohammed Thari Nabeel (New York University), Mohammed Ashraf (New York University), Jeyavijayan (JV) Rajendran (University of Texas at Dallas), Ozgur Sinanoglu (New York University)
[PDF]
Session: 5G
Stacco: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves
Yuan Xiao (The Ohio State University), Mengyuan Li (The Ohio State University), Sanchuan Chen (The Ohio State University), Yinqian Zhang (The Ohio State University)
To BLISS-B or not to be - Attacking strongSwan’s Implementation of Post-Quantum Signatures
Peter Pessl (Graz University of Technology), Leon Groot Bruinderink (Technische Universiteit Eindhoven), Yuval Yarom (University of Adelaide / Data61)
Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions
Joel Alwen (IST Austria), Jeremiah Blocki (Purdue University), Ben Harsha (Purdue University)
FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware
Jian Huang (Georgia Institute of Technology), Jun Xu (The Pennsylvania State University), Xinyu Xing (The Pennsylvania State University), Peng Liu (The Pennsylvania State University), Moinuddin K. Qureshi (Georgia Institute of Technology)
[PDF]
Session: 4J
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX
Wenhao Wang (Indiana University), Guoxing Chen (The Ohio State University), Xiaorui Pan (Indiana University), Yinqian Zhang (The Ohio State University), XiaoFeng Wang (Indiana University), Vincent Bindschaedler (University of Illinois at Urbana-Champaign), Haixu Tang (Indiana University), Carl A. Gunter (University of Illinois at Urbana-Champaign)
[PDF]
Session: 4K
Standardizing Bad Cryptographic Practice - A teardown of the IEEE standard for protecting electronic-design intellectual property
Animesh Chhotaray (University of Florida), Adib Nahiyan (University of Florida), Thomas Shrimpton (University of Florida), Domenic J Forte (University of Florida), Mark Tehranipoor (University of Florida)
[PDF]
Session: 3G
Deterministic, Stash-Free Write-Only ORAM
Daniel S. Roche (United States Naval Academy), Adam J. Aviv (United States Naval Academy), Seung Geol Choi (United States Naval Academy), Travis Mayberry (United States Naval Academy)
Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers
Thomas Espitau (UPMC), Pierre-Alain Fouque (Université de Rennes 1), Benoït Gérard (DGA.MI), Mehdi Tibouchi (NTT Secure Platform Laboratories)
On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs
Shahin Tajik (Technische Universität Berlin), Heiko Lohrke (Technische Universität Berlin), Jean-Pierre Seifert (Technische Universität Berlin), Christian Boit (Technische Universität Berlin)
(Award Finalist)
[PDF]
[Paper]
Session: 1H
FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution
Grant Hernandez (University of Florida), Farhaan Fowze (University of Florida), Dave (Jing) Tian (University of Florida), Tuba Yavuz (University of Florida), Kevin Butler (University of Florida)
Presence Attestation: The Missing Link In Dynamic Trust Bootstrapping
Zhangkai Zhang (Beihang University), Xuhua Ding (Singapore Management University), Gene Tsudik (University of California, Irvine), Jinhua Cui (Singapore Management University), Zhoujun Li (Beihang University)
[PDF]
Session: 2A
SGX-BigMatrix: A Practical Encrypted Data Analytic Framework With Trusted Processors
Fahad Shaon (University of Texas at Dallas), Murat Kantarcioglu (University of Texas at Dallas), Zhiqiang Lin (University of Texas at Dallas), Latifur Khan (University of Texas at Dallas)
[PDF]
Session: 5E
A Formal Foundation for Secure Remote Execution of Enclaves
Pramod Subramanyan (University of California, Berkeley), Rohit Sinha (University of California, Berkeley), Ilia Lebedev (Massachusetts Institute of Technology), Srinivas Devadas (Massachusetts Institute of Technology), Sanjit Seshia (University of California, Berkeley)
(Award Finalist)
[PDF]
[Paper]
[Artifact]
Session: 4K