Keynotes
Keynote 1 (Sept 3rd):
AMMAR ALKASSAR,
CEO Sirrix AG, Germany
Bio: Ammar Alkassar is the chairman of the board (since 2005) of Sirrix AG Security
Technologies, one of Germany’s leading security suppliers.
Mr. Alkassar has a B.Sc. in Electrical Engineering and Computer Science and a M.Sc. from
Saarland University. Before joining Sirrix, Alkassar was senior researcher at the German Center
for Artificial Intelligence, and before that he was a researcher at Stevens Tech, NJ and HUT,
Helsinki.
Mr. Alkassar is a board in the German IT-Security association TeleTrusT in the export initiative
IT-Security made in Germany, and Director at the European Centre for IT- Security in Bochum.
Keynote 2 (Sept 4th): Vincent van der Leest
Intrinsic-ID, The Netherlands
Vincent van der Leest is Director Business Development at Intrinsic-ID. Until recently he has
been Senior Project Leader at the company, leading several European and Dutch research
projects amongst others in FP7, EUREKA and SBIR programs. During his career he has
worked for major Dutch companies ASML, Philips and ProRail before he joined Intrinsic-ID in
2009. One of the projects that he has lead was the UNIQUE project, which has successfully
taped out a 65nm ASIC containing 6 different types of PUFs. His research at Intrinsic-ID has
been oriented toward PUFs, coding theory and hardware security implementations. He
published around 20 papers in these areas, among which at (hardware and security)
conferences like CHES, DATE and HOST. He is regularly invited to teach lectures on Physically
Unclonable Functions. He holds a masters degree in Electrical Engineering from Eindhoven
University of Technology.
Title “PUFs: Trust Anchors for Hardware Intrinsic Security”
Abstract:
IP vendors, semiconductor manufacturers, OEMs and system providers are facing increasing
security problems due to a growing number of persistent attackers. Counterfeiting of goods and
electronic devices is a growing problem that has a huge economic impact on the electronics
industry. Sometimes the consequences are even more dramatic, when critical systems start
failing due to the use of counterfeit lower quality components. Also, hackers are becoming
increasingly sophisticated and the availability of equipment for performing invasive and
tampering attacks on semiconductor devices is increasing. Physical Unclonable Functions (or
PUFs) offer the potential to reduce problems of counterfeiting and hardware oriented attacks
drastically. PUFs make use of the unique characteristics deep down in the transistors of the
integrated circuits of the device to create a device unique “electronic fingerprint”. Due to deep-
submicron manufacturing process variations every transistor in an IC has slightly different
physical properties that lead to measurable differences in terms of its electronic properties like
threshold voltage and gain factor. Since these process variations are uncontrollable during
manufacturing, the physical properties of a device can neither be copied nor cloned. It is
impossible to purposely create a device with a given fingerprint. In this talk will be discussed
how PUFs can be used to prevent various attacks and forms of counterfeiting and over-
production. Additional topics that will be discussed are how PUF technology can also be used
to bind software or user data to specific hardware devices, how PUFs can be used for strong
authentication, secure key storage and random number generation