June 23-26, 2025, Munich, Germany
In recent years, we have witnessed severe security incidences caused by buggy protocols or implementations of cryptographic algorithms: POODLE, DROWN, OpenSSL Heartbleed, Windows Curveball certificate validation vulnerability, PDF shadow attacks, Google Titan Token Bluetooth bug, Samsung Galaxy IV reuse, vulnerable DUHK RNG, etc. It is critical for practitioners and researchers to ensure the security of cryptographic software and hardware, which are essential for a wide range of systems, services, and applications.
Professor Daniel Gruss,
Graz University of Technology
Title: How the Microarchitecture undermines Confidentiality and Integrity
Abstract: In this talk we will discuss a range of microarchitectural attacks. We will see that the microarchitecture is a common source of information leakage, with the example of different side channel attacks, transient-execution attacks, and even architectural leakage due to bugs in the processor implementation. We then show that integrity can also be compromised both due to physical effects and due to implementation bugs.
Bio: Daniel Gruss is a Professor at Graz University of Technology. He has been teaching undergraduate courses since 2010. Daniel's research focuses on side channels and transient execution attacks. He implemented the first remote fault attack running in a website, known as Rowhammer.js. His research team was one of the teams that found the Meltdown and Spectre bugs published in early 2018. He frequently speaks at top international venues. In 2022, he received a prestigious ERC StG Grant to research the foundations of sustainable security.
The aim of the SCI workshop is to provide an international forum of scientific research and development to explore the security issues in the implementation and deployment of cryptographic solutions. We are interested in these main aspects: (1) vulnerabilities and defenses in the implementation of cryptographic algorithms; (2) vulnerabilities and defenses in the implementation of cryptographic protocols; (3) defective cryptographic algorithms and protocols deployed in the wild; (4) weak cryptographic keys and random numbers in the cryptographic implementation; (5) runtime cryptographic key attacks and protections; (6) certificates and key management; (7) misuse or abuse of cryptographic services; and (8) other topics on secure cryptographic implementations.
We try to promote secure cryptographic solutions in the Internet, by exploring and discussing the (in)security issues. We solicit submissions of original research papers on a wide range of topics, including but not limited to:
We are especially interested in papers with novel ideas, position papers, pilot studies, and initial findings. An ACNS workshop best paper award will be selected from the accepted papers of all workshops. Meanwhile, the workshop will include an interesting keynote talk, which will be announced on the workshop web site as arrangements are finalized.
Prospective authors are invited to submit manuscripts describing original work. The manuscript has to be written in English and in PDF format. All submissions must follow the original LNCS format (accessible on the Springer LCNS author guidelines webpage) with a page limit of 20 pages including all references and appendices.
The post-proceedings of the SCI workshop will be published by Springer in the LNCS series.
Submit your papers: https://easychair.org/conferences/?conf=acnssci2025
March 15 March 22, 2025, 23:59, AoE (EXTENDED)
April 20, 2025
May 12, 2025
Dr. Jingqiang Lin
University of Science and Technology of China
linjq <at> ustc.edu.cn