Time | Session Chair | Session Details |
---|---|---|
9:00 - 9:15 | TBA | Welcome Remarks |
9:15 - 9:30 | TBA | Opening remarks |
News from the NEHWS Community | ||
9:30 - 10:30 | TBA | Invited Keynote by Todd Austin (UMich) |
10:30 - 10:45 | Break | |
10:45 - 12:00 | TBA | Submitted Talks— Session I |
Long Talk: FaultDetective: Explainable to a Fault, from the Design Layout to the Software | ||
Zhenyuan Liu, Dillibabu Shanmugam, and Patrick Schaumont | ||
Short Talk: BackMon: IC Backside Tamper Detection using On-Chip Impedance Monitoring | ||
Tahoura Mosavirik and Shahin Tajik | ||
Long Talk: Who is in Control? Security Risks in Commercial ADAS | ||
Yingjie Cao, George Crane, Haoqi Shan, and Dean Sullivan | ||
Short Talk: Energy-Accuracy-Security Trade-offs in Resistive In-Memory Computing Architectures | ||
Saion Roy and Naresh Shanbhag | ||
Long Talk: VGF: Value-Guided Fuzzing – Fuzzing Hardware as Hardware | ||
Ruochen Dai, Michael Lee, Patrick Hoey, Weimin Fu, Yier Jin, Xiaolong Guo, Shuo Wang, Dean Sullivan, Tuba Yavuz, and Orlando Arias | ||
Short Talk: USBSnoop – Revealing Device Activities via USB Congestions | ||
Dais Ranney, Yufei Wang, A. Adam Ding, and Yunsi Fei | ||
12:00 - 1:30 | Lunch and Poster Session | |
1:30 - 2:30 | Seetal Potluri | Panel Discussion: “Secure-by-Construction for Hardware Design: Mission Impossible or Walk in the Park?” |
- Shivam Bhasin (Nanyang Technical University) | ||
- Srini Devadas (Massachusetts Institute of Technology) | ||
- Sharad Malik (Princeton University) | ||
- Christof Paar (Max Planck Institute) | ||
- Dominic Rizzo (zeroRISC) | ||
2:30 - 3:30 | TBA | Invited Keynote by Ed. Suh (Nvidia) |
3:30 - 3:40 | Break | |
3:40 - 4:45 | TBA | Submitted Talks— Session II |
Long Talk: Exploiting Exclusive System-Level Cache in Apple M-Series SoCs for Enhanced Cache Occupancy Attacks | ||
Tianhong Xu, Aidong Ding, and Yunsi Fei | ||
Short Talk: Uncertainty Estimation in Neural Network-enabled Side-channel Analysis and Links to Interpretability | ||
Seyedmohammad Nouraniboosjin and Fatemeh Ganji | ||
Long Talk: Oreo: Protecting ASLR Against Microarchitectural Attacks | ||
Shixion Song, Joseph Zhang, and Mengjia Yan | ||
Short Talk: Cross-Layer EM Fault Injection Assessment Framework | ||
Hanqiu Weng, Ruochen Dai, Tuba Yavuz, Xiaolong Guo, Orlando Arias, Dean Sullivan, Siqi Dai, Honggang Yu, Michael Lee, Domenic Forte, and Shuo Wang | ||
Long Talk: IvLeague: Side Channel-resistant Secure Architectures Using Isolated Domains of Dynamic Integrity Trees | ||
Md Hafizul Islam Chowdhury and Fan Yao | ||
4:45 - 5:45 | TBA | Invited Keynote by Makoto Nagata (Kobe University) |
5:45 - 6:00 | Yingjie Lao | Best Poster Award and Closing Remarks |
6:00 - 7:00 | Networking reception |
On-die Differential Sensing for Monitoring and Analysis of Dynamic Computing Environments, Shahriar Hadayeghparast, Xiang Li, Aleksa Deric, and Daniel Holcomb
Hardware Acceleration for Fully Homomorphic Encryption Scheme Switching from CKKS to FHEW, Kaiyuan Zhang, Antian Wang, Keshab Parhi, and Yingjie Lao
Logical Maneuvers: Detecting and Mitigating Adversarial Hardware Faults in Space, Fatemeh Khojasteh Dana, Saleh Khalaj Monfared, and Shahin Tajik
Side-channel Threats in Fault-Tolerant Quantum Computers, Theodoros Trochatos, Christopher Kang, Frederic T. Chong, and Jakub Szefer
Securing HHL Quantum Algorithm against Quantum Computer Attacks, Yizhuo Tan, Hrvoje Kukina, and Jakub Szefer
Winograd for NTT: A Case Study on Higher-Radix and Low-Latency Implementation of NTT for Post Quantum Cryptography on FPGA, Suraj Mandal and Debapriya Basu Roy
An On-Chip Sensor Placement Strategy for Voltage-Drop Attack Mitigation, Mashrafi Alam Kajol, Sandeep Sunkavilli, and Qiaoyan Yu
Fault Injection on Reinforcement Learning, Tom Slooff, Anthony Etim, Jiaqi Yu, Francesco Regazzoni, and Jakub Szefer
ChipletPing: On-die Digital Impedance Sensing for Chiplet and Interposer Verification, Saleh Monfared, Maryam Saadat Safa, and Shahin Tajik
Reverse Cross Entropy Optimizations for Efficient Adversarial Detection and Defense, Zirui Fu and Marco Donato
CAPRI6: A Solution for Fault Root Cause Detection, Dillibabu Shanmugam, Zhenyuan Liu, and Patrick Schaumont
LeakFlow: Power Side-Channel Leakage Simulation and Assessment Tool, Andrew Malnicof, Zhenyuan Liu, and Patrick Schaumont
Security Attacks Abusing Pulse-level Quantum Circuits, Chuanqi Xu and Jakub Szefer
Integrated Security Mechanisms for Weight Protection in Memristive Crossbar Arrays, Muhammad Faheemur Rahman and Wayne Burleson
X-DFS: Explainable Artificial Intelligence Guided Design-for-Security Solution Space Exploration, Tanzim Mahfuz and Prabuddha Chakraborty
LooseWire: Identifying Root Causes of Side-channel Leakage in an Open-Source FPGA, Evan Apinis, Zhenyuan Liu, and Patrick Schaumont
AI-enabled, Automated, and Efficient Electromagnetic Side-Channel Acquisition, Dev M. Mehta, Maryam Saadat Safa, Alessandra Savio Serpes, Seyedmohammad Nouraniboosjin, Shahin Tajik, and Fatemeh Ganji
Automation of Photon Emission Analysis Pipeline for Hardware Security, Spencer Harding, Keegan Kuhn, Scott West, Dev M. Mehta, Shahin Tajik, and Fatemeh Ganji
Chosen Cyphertext Attack on Barret Reduction in CRYSTALS-Kyber, Yashaswini Makaram, Yunsi Fei, and David Kaeli
Cross CPU-GPU Rowhammer Attack, Yufei Wang