FDTC 2017  
Fourteenth Workshop on Fault Diagnosis and Tolerance in Cryptography
Taipei, Taiwan
25 September 2017 (Submissions 9 June 2017)
URL: http://conferenze.dei.polimi.it/FDTC17/index.html

Fault injection is one of the most exploited means for extracting
confidential information from embedded devices and  for compromising
their intended operation. Therefore, research on developing
methodologies, techniques, architectures and design tools for robust
cryptographic systems (both hardware and software), and on protecting
them against both  accidental faults and intentional attacks is
essential. Of particular interest are models and metrics for quantifying
the protection of systems and protocols against malicious injection of
faults and to estimate the leaked confidential information. FDTC is the
reference event in the field of fault analysis, attacks and countermeasures

Topics of interest include but are not limited to:

  * fault injection and exploitation
      o mechanisms (e.g., using lasers, electromagnetic induction, or
        clock / power supply manipulation)
      o attacks on cryptographic devices (HW and SW) or protocols
      o combined implementation attacks
  * countermeasures:
      o fault resistant hardware / implementations of cryptographic
      o countermeasures to detect fault injections
      o techniques providing fault tolerance (inherent reliability)
      o fault resistant protocols
      o measures to prevent fault injection (e.g., physical protection,
        fault diagnosis)
  * models and metrics for fault attack analysis
      o metrics for fault attacks robustness and the leaked information
      o models of fault injection
      o modeling and analysis (e.g., modeling the reliability of systems
        or protocols)
  * fault attack resistant architectures
      o fault attack resistant processor designs
      o fault attack resistant hardware
      o fault attack resistant software
  * design tools supporting analysis of fault attacks and countermeasures
      o early estimation of fault attack robustness
      o automatic applications of fault countermeasures
  * fault attacks and reliability
  * case studies of attacks, fault diagnosis, and tolerance techniques

For more information, please see