Fifth International Conference on Emerging Security Technologies (EST-2014)
Keynotes
Keynote 1 (Sept 3rd): AMMAR ALKASSAR, CEO Sirrix AG, Germany Bio:  Ammar Alkassar is the chairman of the board (since 2005) of Sirrix AG Security Technologies, one of Germany’s leading security suppliers. Mr. Alkassar  has a B.Sc. in Electrical Engineering and Computer Science and a M.Sc. from Saarland University. Before joining Sirrix, Alkassar was senior researcher at the German Center for Artificial Intelligence, and before that he was a researcher at Stevens Tech, NJ and HUT, Helsinki. Mr. Alkassar is a board in the German IT-Security association TeleTrusT in the export initiative IT-Security made ​​in Germany, and Director at the European Centre for IT- Security  in Bochum. Keynote 2 (Sept 4th): Vincent van der Leest Intrinsic-ID, The Netherlands Vincent van der Leest is Director Business Development at Intrinsic-ID. Until recently he has been Senior Project Leader at the company, leading several European and Dutch research projects amongst others in FP7, EUREKA and SBIR programs. During his career he has worked for major Dutch companies ASML, Philips and ProRail before he joined Intrinsic-ID in 2009. One of the projects that he has lead was the UNIQUE project, which has successfully taped out a 65nm ASIC containing 6 different types of PUFs. His research at Intrinsic-ID has been oriented toward PUFs, coding theory and hardware security implementations. He published around 20 papers in these areas, among which at (hardware and security) conferences like CHES, DATE and HOST. He is regularly invited to teach lectures on Physically Unclonable Functions. He holds a masters degree in Electrical Engineering from Eindhoven University of Technology. Title “PUFs: Trust Anchors for Hardware Intrinsic Security”  Abstract: IP vendors, semiconductor manufacturers, OEMs and system providers are facing increasing security problems due to a growing number of persistent attackers. Counterfeiting of goods and electronic devices is a growing problem that has a huge economic impact on the electronics industry. Sometimes the consequences are even more dramatic, when critical systems start failing due to the use of counterfeit lower quality components. Also, hackers are becoming increasingly sophisticated and the availability of equipment for performing invasive and tampering attacks on semiconductor devices is increasing. Physical Unclonable Functions (or PUFs) offer the potential to reduce problems of counterfeiting and hardware oriented attacks drastically. PUFs make use of the unique characteristics deep down in the transistors of the integrated circuits of the device to create a device unique “electronic fingerprint”. Due to deep- submicron manufacturing process variations every transistor in an IC has slightly different physical properties that lead to measurable differences in terms of its electronic properties like threshold voltage and gain factor. Since these process variations are uncontrollable during manufacturing, the physical properties of a device can neither be copied nor cloned. It is impossible to purposely create a device with a given fingerprint. In this talk will be discussed how PUFs can be used to prevent various attacks and forms of counterfeiting and over- production. Additional topics that will be discussed are how PUF technology can also be used to bind software or user data to specific hardware devices, how PUFs can be used for strong authentication, secure key storage and random number generation
EST-2014