6th ACNS Workshop on Secure Cryptographic Implementation

June 23-26, 2025, Munich, Germany

© München Tourismus, Thomas Klinger



In recent years, we have witnessed severe security incidences caused by buggy protocols or implementations of cryptographic algorithms: POODLE, DROWN, OpenSSL Heartbleed, Windows Curveball certificate validation vulnerability, PDF shadow attacks, Google Titan Token Bluetooth bug, Samsung Galaxy IV reuse, vulnerable DUHK RNG, etc. It is critical for practitioners and researchers to ensure the security of cryptographic software and hardware, which are essential for a wide range of systems, services, and applications.



Chairs


Keynote

Daniel Gruss

Professor Daniel Gruss,
Graz University of Technology

Title: How the Microarchitecture undermines Confidentiality and Integrity

Abstract: In this talk we will discuss a range of microarchitectural attacks. We will see that the microarchitecture is a common source of information leakage, with the example of different side channel attacks, transient-execution attacks, and even architectural leakage due to bugs in the processor implementation. We then show that integrity can also be compromised both due to physical effects and due to implementation bugs.

Bio: Daniel Gruss is a Professor at Graz University of Technology. He has been teaching undergraduate courses since 2010. Daniel's research focuses on side channels and transient execution attacks. He implemented the first remote fault attack running in a website, known as Rowhammer.js. His research team was one of the teams that found the Meltdown and Spectre bugs published in early 2018. He frequently speaks at top international venues. In 2022, he received a prestigious ERC StG Grant to research the foundations of sustainable security.

Call for papers


The aim of the SCI workshop is to provide an international forum of scientific research and development to explore the security issues in the implementation and deployment of cryptographic solutions. We are interested in these main aspects: (1) vulnerabilities and defenses in the implementation of cryptographic algorithms; (2) vulnerabilities and defenses in the implementation of cryptographic protocols; (3) defective cryptographic algorithms and protocols deployed in the wild; (4) weak cryptographic keys and random numbers in the cryptographic implementation; (5) runtime cryptographic key attacks and protections; (6) certificates and key management; (7) misuse or abuse of cryptographic services; and (8) other topics on secure cryptographic implementations.


We try to promote secure cryptographic solutions in the Internet, by exploring and discussing the (in)security issues. We solicit submissions of original research papers on a wide range of topics, including but not limited to:



We are especially interested in papers with novel ideas, position papers, pilot studies, and initial findings. An ACNS workshop best paper award will be selected from the accepted papers of all workshops. Meanwhile, the workshop will include an interesting keynote talk, which will be announced on the workshop web site as arrangements are finalized.


Prospective authors are invited to submit manuscripts describing original work. The manuscript has to be written in English and in PDF format. All submissions must follow the original LNCS format (accessible on the Springer LCNS author guidelines webpage) with a page limit of 20 pages including all references and appendices.


The post-proceedings of the SCI workshop will be published by Springer in the LNCS series.


Submit your papers: https://easychair.org/conferences/?conf=acnssci2025




Important Dates


Paper submission deadline

March 15 March 22, 2025, 23:59, AoE (EXTENDED)

Acceptance Notification

April 20, 2025

Camera Ready

May 12, 2025

Program Committee

  • Florian Caullery HENSOLDT Cyber GmbH, Germany
  • Bo Chen Michigan Technological University, USA
  • Yikang Chen The Chinese University of Hong Kong, China
  • Jiankuo Dong Nanjing University of Posts and Telecommunications, China
  • Haixin Duan Tsinghua University, China
  • Shanqing Guo Shandong University, China
  • Honggang Hu University of Science and Technology of China, China
  • Shijie Jia Chinese Academy of Sciences, China
  • Rongxing Lu University of New Brunswick, Canada
  • Bingyu Li Beihang University, China
  • Fengjun Li University of Kansas, USA
  • Chunli Lv China Agricultural University, China
  • Kui Ren Zhejiang University, China
  • Jun Shao Zhejiang Gongshang University, China
  • Ruisheng Shi Beijing University of Posts and Telecommunications, China
  • Shifeng Sun Shanghai Jiao Tong University, China
  • Qiang Tang The University of Sydney, Australia
  • An Wang Beijing Institute of Technology, China
  • Ding Wang Nankai University, China
  • Juan Wang Wuhan University, China
  • Bowen Xu Ningbo University, China
  • Fangyu Zheng Chinese Academy of Sciences, China
  • Cong Zuo Beijing Institute of Technology, China