Seminars

NO.236 Provable Security for Trustworthy Embedded Systems against Physical Attacks - From Theory to Practice

Shonan Village Center

March 16 - 19, 2026 (Check-in: March 15, 2026 )

Organizers

  • Yuko Hara
    • Institute of Science Tokyo
  • Svetla Nikova
    • KU Leuven
  • Kazuo Sakiyama
    • University of Electro-Communications

Overview

Description of the Meeting

In the Internet of Things (IoT) era, a number of embedded devices are considered as security-critical in a sense that they are handling confidential data. The communication between such devices can be protected using cryptographic techniques, such as the AES and RSA primitives. However, these devices can be attacked via implementation means (a combination of active/passive and local/remote approaches). Representative examples are Differential Power Analysis, which is to observe the device's power consumption (developed by Kocher et al. in 1999), and Differential Fault Analysis, which is to inject faults in the device's computation for figuring out the cryptographic secrets (developed by Biham and Shamir in 1997). Since then, these threats have been well recognized and a whole new area of research has been established looking at both new physical attacks and efficient countermeasures to resist the attacks.

The first Shonan Meeting focusing on hardware security (No.028), which was still an evolving research field back then, was held in 2014 to discuss how designers can construct secure hardware in a systematic way. In the past 10 years after the Shonan Meeting (No.028), we have been observing drastic advancements and evolutions in the information processing infrastructure to lead the current IoT technology -- CMOS downscaling, the prevalence of system-level (higher abstraction level) design methods, further advancement of cryptographic theory, artificial intelligence (AI) technologies, etc. Because of them, there are now a variety of attack targets/applications (not only cryptographic primitives but also (for example) AI-based applications), countermeasures in hardware and software (and combinations of both), and attack techniques, for which the secure implementations are much more complicated. For such a multidisciplinary research field, it was not easy to have tight interactions between different research communities. Therefore, this meeting will encourage researchers in both - theory and practice - to tightly interact and exchange insights and work together towards practical methods for secure embedded systems implementations. Specifically, this meeting aims to discuss the following scientific questions:

  • Development of practical adversary models reflecting well real physical attacks and
    making it possible to prove the security of countermeasures in these models
  • Design of efficient and effective provably secure countermeasures against side-channel
    attacks (SCA), fault attacks and combined attacks both in hardware and software
  • The new threats when IoT and AI technologies are advanced and diversified, forexample in terms of the attack targets/applications and methods.

To encourage these discussions, we plan to invite leading researchers and practitioners with a variety of background in terms of theory/practice, hardware/software, countermeasure/attack, etc.

The organizers of this meeting are also diversified in their research area – Hara with the EDA background (particularly for hardware), Nikova with the theoretical background (developed one of the well-known SCA countermeasures; threshold implementation), and Sakiyama with the hardware security background in both industry and academia.