About


In the field of hardware security, recent years have seen development of numerous threats : micro-architectural attacks, deep-learning based attacks, emerging side channels and perturbation attacks, and finally quantum computer. This is strengthening the need for innovation in trusted hardware (not limited to): open HW based architectures, efficient and secure pre and post-quantum cryptography, emerging microelectronic technologies, sensors, countermeasures, embedded SW and co-design approach.

In this context, the PHISIC workshop aims at providing an environment for exchange among academic and industrial experts of the embedded security arena. More precisely, PHISIC’2025 expects to:

  • contribute and share ideas on the latest trends in terms of academic research, collaborative projects and industrial challenges
  • identify future hardware security trends and solutions
  • exchange on advanced practices in physical attacks (fault injection and side channel analysis) and efficient protection schemes

Call for Talks and Posters

We invite you to submit your abstract (10-20 lines) for the oral sessions or posters to the Organising Committee by Monday 17 March 2025: [email protected] or visit the contact page.

PHISIC’2025 is a workshop without proceedings. Presentations and posters will be publicly available after the workshop (unless otherwise stated by the authors).

Presentations will be 30 minutes in length, including 5-10 minutes for Q&A. Presentations must be in English. Please note that presentation does not preclude future or concurrent submission to a journal or conference with proceedings.

PHISIC Key Dates

  • Abstract submission deadline: 17 March 2025
  • Workshop programme online: 28 March 2025
  • Registration opening: 24 March 2025
  • Registration close: 5 May 2025
  • PHISIC: 20-21 May 2025

Follow us on Bluesky

Topics

  • Side Channel & Fault injection attacks
  • SW and HW protections against physical threats
  • Emerging technologies for secure devices
  • Machine Learning & security
  • Security assessment and verification: leakage assessment, formal verification, etc.
  • Security challenges for IoT and mobile devices
  • Cryptographic algorithms and related implementations: Post-quantum crypto, lightweight crypto, etc.
  • Remote physical attacks
  • Hardware reverse engineering
  • Other topics of interest related to hardware security

Attendance

Note that the registration is free of charge but the number of attendees (by invitation) is limited.

See accommodations and location or contact the organization committee for further explanation.