The fourth NEHWS was organized on 5 April, 2024 at the Worcester Polytechnic Institute in Worcester, MA.
Session Chair | ||
---|---|---|
9:00 - 9:15 | Shahin Tajik | Welcome Remarks |
9:15 - 9:30 | Fatemeh Ganji | Opening remarks by Ben Linville-Engler (MassTech) “ME Commons and CHIPS Act” |
News from the NEHWS Community | ||
9:30 - 10:30 | Fatemeh Ganji | Invited Keynote: Sharad Malik, Don’t Trust, and Verify |
10:30 - 10:45 | Break | |
10:45 - 12:00 | Xiaolin Xu | Submitted Talks Session I |
Long Talk: Breaching Privacy: Memory Scraping Attack on Xilinx FPGAs | ||
Bharadwaj Madabhushi, Sandip Kundu and Daniel Holcomb (University of Massachusetts Amherst) | ||
Short Talk: Driving into The Unknown: Investigating and Addressing Security Breaches in Vehicle Infotainment System | ||
Yingjie Cao, Haoqi Shan, Maisha Mastora and Dean Sullivan (University of New Hampshire) | ||
Long Talk: Deep-learning Model Extraction through Software-based Power Side-channel | ||
Xiang Zhang, A. Adam Ding and Yunsi Fei (Northeastern University) | ||
Short Talk: SecureLoop: Design Space Exploration of Secure DNN Accelerators | ||
Kyungmi Lee, Mengjia Yan, Joel Emer and Anantha Chandrakasan (Massachusetts Institute of Technology) | ||
Long Talk: LeakyOhm: Secret Bits Extraction using Impedance Analysis | ||
Saleh Khalaj Monfared, Tahoura Mosavirik and Shahin Tajik (Worcester Polytechnic Institute) | ||
Short Talk: A Full-Stack Approach for Side-Channel Secure ML Hardware | ||
Anuj Dubey and Aydin Aysu (North Carolina State University) | ||
12:00 - 1:30 | Lunch and Poster Session | |
1:30 - 2:30 | Mengjia Yan | Panel Discussion: The Good and the Bad of Hardware Security |
Panelists: | ||
- Dominic Rizzo (zeroRISC Inc.) | ||
- Gayatri Perlin (BAE) | ||
- Silviu Chiricescu (DRAPER) | ||
- Ed Suh (Meta/Cornell) | ||
- Wajdi K. Feghali (Intel) | ||
2:30 - 3:30 | Xiaolin Xu | Invited Keynote: Andreas Olofsson, Composable chiplets and implications for disaggregated design |
3:30 - 3:40 | Break | |
3:40 - 4:45 | Fatemeh Ganji | Submitted Talks Session II |
Long Talk: Architectures for Secure Quantum Computing Systems | ||
Jakub Szefer (Yale University) | ||
Short Talk: 1/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits | ||
Dev Mehta, Mohammad Hashemi, Domenic Forte, Shahin Tajik and Fatemeh Ganji (Worcester Polytechnic Institute) | ||
Long Talk: Protecting Sensors from Electromagnetic Side-channel Leakage | ||
Yan Long and Kevin Fu (Northeastern University) | ||
Short Talk: On the Feasibility of Golden-free PCB Verification | ||
Maryam Saadat Safa, Patrick Schaumont and Shahin Tajik (Worcester Polytechnic Institute) | ||
Long Talk: EntryBleed: A Universal KASLR Bypass against KPTI on Linux | ||
William Liu, Joseph Ravichandran and Mengjia Yan (Massachusetts Institute of Technology) | ||
4:45 - 5:00 | Qiaoyan Yu and Koksal Mus | Best Poster Award and Closing Remarks |
5:00 - 6:00 | Networking reception |
Extending FPGA Information Leaks with Trojan Phantom Circuits, Anthony Etim, Shanquan Tian and Jakub Szefer
NNTesting: Neural Network Fault Attacks Detection Using Gradient-Based Test Vector Generation, Antian Wang and Yingjie Lao
VertexSerum: Poisoning Graph Neural Networks for Link Inference, Ruyi Ding, Shijin Duan, Xiaolin Xu and Yunsi Fei
USBSnoop: Revealing Devices Activities via USB Congestion, Davis Ranney and Yufei Wang
TrustZoneTunnel: A Cross-world Pattern History Table-based Microarchitectural Side-channel Attack, Tianhong Xu and Yunsi Fei
SiliconEchoes: Non-Invasive Trojan and Tamper Detection using Frequency-Selective Impedance Analysis, Tahoura Mosavirik, Saleh Khalaj Monfared, Maryam Saadat Safa and Shahin Tajik
Voltage-Drop Attack Mitigation in Multi-Tenant FPGA Environments, Mashrafi Alam Kajol, Sandeep Sunkavilli and Qiaoyan Yu
Information Leakage in Quantum Computers, Chuanqi Xu and Jakub Szefer
PQC-DSA in Hardware, Sanjay Deshpande, James Howe, Cansu Karakuzu, Yongseok Lee, Yunheung Paek, Jakub Szefer and Dongze Yue
LightEMU: Hardware-Assisted Fuzzing of Trusted Applications, Haoqi Shan, Sravani Nissankarararao, Yujia Liu, Moyao Huang, Shuo Wang, Yier Jin and Dean Sullivan
Power Side-Channel Attacks on Quantum Computer Controllers & Quantum Circuit Reconstructions, Ferhat Erata, Chuanqi Xu, Ruzica Piskac and Jakub Szefer
HeisenTrojans: A New Class of Hardware Attacks, Akshita Mavurapu, Haoqi Shan, Xiaolong Guo, Orlando Arias and Dean Sullivan
Dynamic Attack Resilience for New FPGA Use Model, Sandeep Sunkavilli, Nishanth Chennagouni and Qiaoyan Yu
SoteriaQ: Securing Quantum Circuits, Theodoros Trochatos
Developing a Threat Model of Laser-Induced Acoustic Interference in Computer Vision-Assisted Vehicles, Nina Shamsi, Kaeshav Chandrasekar, Yan Long, Christopher Limbach, Keith Rebello, Kevin Fu
A Hybrid Neural Network for Simultaneous Multi-Attack Detection in Sensor Networks, Nishanth Chennagouni, Mohammad Monjur, Wei Lu and Qiaoyan Yu
Homomorphic Encryption Dataflow Optimizations With Evaluation on the Ring Processing Unit (RPU), Negar Neda, Austin Ebel and Brandon Reagen
Efficient Privacy-preserving NN Inference at the Edge, Antonio Torres, Mohammad Hashemi and Fatemeh Ganji
Too Hot To Be True: Temperature Calibration for Higher Confidence in NN-assisted Side-channel Analysis, Seyedmohammad Nouraniboosjin and Fatemeh Ganji
T-Scope: Side-channel Leakage Assessment with a Hardware-accelerated Online TVLA Test, Hao Wang, Andrew Malnicof and Patrick Schaumont
SCAPEgoat: A Side Channel Analysis Library, Trey Marcantonio, Samuel Karkache, Amit Virchandbhai Prajapati, Dev Mehta, Dillibabu Shanmugam, Mohammad Hashemi, Fatemeh Ganji and Patrick Schaumont
CAPRI6: An ASIC for Fault Root-Causing, Zhenyuan Liu, Dillibabu Shanmugam, Adithya Ramesh and Patrick Schaumont
Energy Detection-Based Framework for Detecting and Mitigating Jamming Attacks in Ultra-Low Power IoT Systems, Shabd Swaroop Kandarpa, Ankit Mittal and Aatmesh Shrivastava
Architecting GPUs for Practical Fully Homomorphic Encryption, Aymane El Jerari, Frank Rossi, Kaustubh Shivdikar, Alexander Ingare and David Kaeli
Microscope: Causality Inference Crossing the Hardware and Software Boundary from Hardware Perspective, Zhaoxiang Liu, Kejun Chen, Dean Sullivan, Orlando Arias and Xiaolong Guo
CAPRI6: Front-end, Simulation and Back-end, Dillibabu Shanmugam, Zhenyuan Liu, Adithya Ramesh and Patrick Schaumont
Decoding Processor Secrets: Exploring Side-Channel Vulnerabilities in Instructions, Arna Roy, Zhenyuan Charlotte Liu and Patrick Schaumont
CAPRI6: FPGA prototyping a 6-core MSP430 for Fault Root Cause Analysis, Adithya Ramesh, Zhenyuan Liu, Dillibabu Shanmugam and Patrick Schaumont
SoteriaQ: Securing Quantum Circuits, Theodoros Trochatos, Chuanqi Xu, Sanjay Deshpande, Yao Lu, Yongshan Ding and Jakub Szefer
Leveraging Large Language Models for Addressing Hardware Security Challenges, Weimin Fu, Xuan Zhang and Xiaolong Guo
Fault+Probe: A Generic Rowhammer-based Bit Recovery Attack, Kemal Derya, M. Caner Tol and Berk Sunar
When Memory Mappings Attack: On the (Mis)use of the ARM Cortex-M FPB Unit, Haoqi Shan, Dean Sullivan and Orlando Arias
The third NEHWS was organized on 7 April, 2023 at the Northeastern University in Boston, MA.
9:00 - 9:15 | Welcome Remarks: Gregory D. Abowd, Dean of Engineering, Northeastern University |
Session Chair: Yunsi Fei | |
9:15 - 9:30 | News from the NEHWS Community |
Session Chair: Dan Holcomb | |
9:30 - 10:30 | Invited Keynote: Kevin Fu, Wicked bizarre semiconductor physics of sensor security |
Session Chair: Dan Holcomb | |
10:30 - 10:45 | Break |
10:45 - 12:00 | Submitted Talks Session I |
Session Chair: Fatemeh Ganji | |
Long Talk: Fuzzing for discovering bugs and side channels in processors | |
Chathura Rajapaksha, Sadullah Canakci, Leila Delshadtehrani, Anoop Nataraja, Michael Bedford Taylor, Manuel Egele and Ajay Joshi (Boston University and University of Washington) | |
Short Talk: Citadel: Side-Channel-Resistant Enclaves with Secure Shared Memory on a Speculative Out-of-Order Processor | |
Jules Drean, Miguel Gomez-Garcia, Thomas Bourgeat and Srinivas Devadas (MIT) | |
Long Talk: A Model Extraction Attack on Deep Neural Networks Running on GPUs | |
Jonah O’Brien Weiss, Dong Hyub Kim, Tiago Alves and Sandip Kundu (University of Massachusetts Amherst) | |
Short Talk: HammerDodger: A Lightweight Defense Framework against RowHammer Attack on DNNs | |
Cheng Gongye, Yukui Luo, Xiaolin Xu and Yunsi Fei (Northeastern University) | |
Long Talk: Pensieve: Microarchitectural Modeling for Formal Security Evaluation | |
Yuheng Yang, Thomas Bourgeat, Stella Lau and Mengjia Yan (MIT) | |
Short Talk: Goblin: Time Is Money, Friend! Timing Side-channel Attack against Garbled Circuit Constructions | |
Mohammad Hashemi, Domenic Forte and Fatemeh Ganji (WPI) | |
12:00 - 1:30 | Lunch and Poster Session sponsored by MITRE |
1:30 - 2:30 | Panel Discussion: Security of Hardware Systems in a Zero-trust Model |
Session Chair: Shahin Tajik | |
Panelists: | |
- Lei Poo (Analog Devices) | |
- Dan Walters (MITRE) | |
- Hamed Okhravi (MIT Lincoln Lab) | |
- Sandhya Koteshwara (IBM) | |
- Sina Shahbazmohamadi (University of Connecticut) | |
2:30 - 3:30 | Invited Keynote: Ran Canetti, From NAND to SCOTUS |
Session Chair: Fatemeh Ganji | |
3:30 - 3:40 | Break |
3:40 - 4:45 | Submitted Talks Session II |
Session Chair: Dan Holcomb | |
Long Talk: Security vs Testability | |
Deniz Karakoyunlu (Analog Devices) | |
Short Talk: ImpedanceVerif: On-Chip Impedance Sensing for System-Level Tampering Detection | |
Tahoura Mosavirik, Patrick Schaumont and Shahin Tajik (WPI) | |
Long Talk: The Next Frontier in Hardware Security: Quantum Computers | |
Jakub Szefer (Yale University) | |
Short Talk: Hardware Security Analyses in Advanced Manufacturing Industry | |
Qiaoyan Yu (University of New Hampshire) | |
Long Talk: EMShepherd: Detecting Adversarial Samples via Side-channel Leakage | |
Ruyi Ding, Cheng Gongye, Siyue Wang, A. Adam Ding and Yunsi Fei (Northeastern University) | |
4:45 - 5:00 | Best Poster Award and Closing Remarks |
Session Chair: Xiaolin Xu and Yunsi Fei | |
5:00 - 6:00 | Networking reception sponsored by Draper |
Awards
Congratulations to the winners of the Best Poster Awards! The awards were decided by popular vote of the audience. We thank NewAE and Riscure for donating the hardware and book awards.
First Place Yuheng Yang, Thomas Bourgeat, Stella Lau and Mengjia Yan, “Pensieve: A Modular Approach for Security Evaluation of Microarchitectural Designs”
Second Place, tied Max Cohen Hoffing, “Voltage Sensor Development for PDN PUF”
Second Place, tied Jonah O’Brien Weiss, Sandip Kundu, Dong Hyub Kim and Tiago Alves, “A Side-Channel Model Extraction Attack on Deep Neural Networks Running on GPUs”
Second Place, tied Xiang Zhang, Aidon Ding and Yunsi Fei, “Software Power Side-channel Assisted Model Extraction of Deep Neural Networks”
Third Place Andrew Adiletta, M. Caner Tol, Yarkin Doroz and Berk Sunar, “Memory Mayhem: Targeted Corruption of Registers and Stack Variables”
The second NEHWS was organized on 1 April, 2022 at the Unversity of Masschusetts in Amherst.
Presentation Topic | |
---|---|
9:30 - 9:35 | Welcome Remarks (Dan Holcomb) |
9:35 - 10:30 | News from the NEHWS Community |
- Fatemeh Ganji (WPI) | |
- Dan Holcomb (Umass) | |
- Yunsi Fei (NEU) | |
- Jakub Szefer (Yale) | |
10:30 - 11:30 | Invited Keynote: Srinivas Devadas (MIT) |
11:30 - 1:00 | Lunch and Poster Session |
1:00 - 3:00 | Research Talks |
- Mengjia Yan (MIT), “Security Analysis of Misunderstood | |
Micro-architectural Side-Channel Attacks and Mitigations” | |
- Jens-Peter Kaps (GMU), “Benchmarking FPGA Implementations | |
of Candidates in the NIST LWC Standardization Process” | |
- Colin O’Flynn (NewAE), “Hands on with Non-Invasive | |
Hardware Security Tooling” | |
3:00 - 3:30 | Break |
3:30 - 4:30 | Panel Discussion: Driving Forces of Innovation in Security of |
Microelectronics Supply Chain | |
Moderator: Shahin Tajik (WPI) | |
Panelists: | |
- Peter Grossmann (Instrinsix) | |
- Elke De Mulder (Rambus) | |
- Richard Newell (Microchip Technology) | |
- John Oakley (SRC) | |
- Ingrid Verbauwhede (KUL) | |
4:30 - 5:00 | Networking and Closing |
Posters
A Cross-Platform Cache Timing Attack Framework via Deep Learning, Ruyi Ding, Ziyue Zhang, Xiang Zhang, Gongye Cheng, Yunsi Fei and A. Adam Ding,
Bitsliced NTT-based Polynomial Multiplication: A Generic Software Countermeasure against Fault Attacks, Richa Singh, Saad Islam, Berk Sunar and Patrick Schaumont
A Novel Differential-Bit Side-channel Power Attack on ECDH and Countermeasures, Tianhong Xu, Cheng Gongye and Yunsi Fei
ScatterVerif: Verification of Electronic Boards Using Reflection Response of Power Distribution Network, Tahoura Mosavirik, Fatemeh Ganji, Patrick Schaumont and Shahin Tajik
Garbled EDA: Privacy Preserving Electronic Design Automation, Mohammad Hashemi, Steffi Roy, Fatemeh Ganji and Domenic Forte
Side-channel analysis of ASCON, Dillibabu Shanmugam, Pantea Kiaei and Patrick Schaumont
Toward Realistic Backdoor Injection Attacks on DNNs using Rowhammer, M. Caner Tol, Saad Islam, Berk Sunar and Ziming Zhang
Quantum Computer Antivirus, Sanjay Deshpande, Chuanqi Xu, Theodoros Trochatos, Hanrui Wang, Ferhat Erata, Song Han, Yongshan Ding and Jakub Szefer
Leaky Frontends: Security Vulnerabilities in Processor Frontends, Bowen Huang, Shuwen Deng and Jakub Szefer
Towards Automatic Detection of Power Side-Channel Vulnerabilities in Constant-Time Cryptography, Ferhat Erata, Ruzica Piskac, Victor Mateu, Santos Merino del Pozo and Jakub Szefer
Improving the Performance and Security of Prior Work SSE-RV, Zhiming Zhang and Yunsi Fei
Precise Fault Injection to Enable DFIA for Attacking AES in Remote FPGAs, Xiang Li, Russell Tessier and Daniel Holcomb
Threat Modeling and Risk Analysis for Miniaturized Wireless Biomedical Devices, Vladimir Vakhter, Betul Soysal, Patrick Schaumont and Ulkuhan Guler
Remote Power Side-Channel Attacks against Hardware Accelerators in FPGA, Shayan Moini
Saidoyoki: Post-Silicon Side-Channel Evaluation, Ramazan Kaan Eren, Pantea Kiaei, Zhenyuan Liu and Patrick Schaumont
DAGguise: Mitigating Memory Timing Side Channels, Peter Deutsch, Yuheng Yang, Thomas Bourgeat, Jules Drean, Joel Emer and Mengjia Yan
Gate-Level Pre-Silicon Side-Channel Leakage Assessment, Pantea Kiaei, Yuan Yao, Zhenyuan Liu and Patrick Schaumont
Security from CAD Tools Perspective for Using Dynamic Partial Reconfiguration in on-premise and off-premise FPGAs, Sandeep Sunkavilli and Qiaoyan Yu
RansNet: An Anti-Ransomware Methodology based on Cache Monitoring and Deep Learning, Xiang Zhang, Ziyue Zhang, Ruyi Ding, Cheng Gongye, Adam Ding and Yunsi Fei
Root-cause Analysis of Power-based Side-channel Leakage in Lightweight Cryptography Candidates, Zhenyuan Liu and Patrick Schaumont
Security Risks and Challenges for Low-power Edge devices in Advanced Manufacturing, Mohammad Monjur and Qiaoyan Yu
There’s Always a Bigger Fish: A Case Study of a Misunderstood Timing Side Channel, Jack Cook, Jules Drean, Jonathan Behrens and Mengjia Yan
PCIe-Contention-Based Covert Channel in Cloud FPGAs, Shanquan Tian, Ilias Giechaskiel and Jakub Szefer
Signature Correction Attack on Dilithium Signature Scheme, Saad Islam, Koksal Mus, Richa Singh, Patrick Schaumont and Berk Sunar
The first NEHWS was organized on 9 April, 2021 as a Virtual Conference
Presentation Topic | |
---|---|
10:00 - 10:05 | Welcome Remarks |
10:05 - 11:00 | Invited Keynote: Wajdi Feghali (Intel) |
11:00 - 11:30 | Community Introduction |
- Worcester Polytechnic Institute | |
- University of Massachusetts at Amherst | |
- Northeastern University | |
- Yale University | |
11:30 - 12:30 | Research Talks |
- Christof Paar (Max Planc Institute of Security and Privacy) | |
- Dominic Rizzo (Google) | |
- Jean-Pierre Seifert (Technical University of Berlin) | |
12:30 - 1:00 | Lunch Break |
1:00 - 2:00 | Poster Session |
2:00 - 3:00 | Panel Discussion: The Future of Hardware Security |
Panelists: | |
- Todd Austin (University of Michigan) | |
- Kevin Bush (MIT Lincoln Lab) | |
- Joe Chapman (MITRE) | |
- Dave King (General Dynamics Mission Systems) | |
- Lei Poo (Analog Devices) | |
3:00 - 4:00 | Networking and Closing |