Session Chair | ||
---|---|---|
9:00 - 9:15 | Shahin Tajik | Welcome Remarks |
9:15 - 9:30 | Fatemeh Ganji | Opening remarks by Ben Linville-Engler (MassTech) “ME Commons and CHIPS Act” |
News from the NEHWS Community | ||
9:30 - 10:30 | Fatemeh Ganji | Invited Keynote: Sharad Malik, Don’t Trust, and Verify |
10:30 - 10:45 | Break | |
10:45 - 12:00 | Xiaolin Xu | Submitted Talks Session I |
Long Talk: Breaching Privacy: Memory Scraping Attack on Xilinx FPGAs | ||
Bharadwaj Madabhushi, Sandip Kundu and Daniel Holcomb (University of Massachusetts Amherst) | ||
Short Talk: Driving into The Unknown: Investigating and Addressing Security Breaches in Vehicle Infotainment System | ||
Yingjie Cao, Haoqi Shan, Maisha Mastora and Dean Sullivan (University of New Hampshire) | ||
Long Talk: Deep-learning Model Extraction through Software-based Power Side-channel | ||
Xiang Zhang, A. Adam Ding and Yunsi Fei (Northeastern University) | ||
Short Talk: SecureLoop: Design Space Exploration of Secure DNN Accelerators | ||
Kyungmi Lee, Mengjia Yan, Joel Emer and Anantha Chandrakasan (Massachusetts Institute of Technology) | ||
Long Talk: LeakyOhm: Secret Bits Extraction using Impedance Analysis | ||
Saleh Khalaj Monfared, Tahoura Mosavirik and Shahin Tajik (Worcester Polytechnic Institute) | ||
Short Talk: A Full-Stack Approach for Side-Channel Secure ML Hardware | ||
Anuj Dubey and Aydin Aysu (North Carolina State University) | ||
12:00 - 1:30 | Lunch and Poster Session | |
1:30 - 2:30 | Mengjia Yan | Panel Discussion: The Good and the Bad of Hardware Security |
Panelists: | ||
- Dominic Rizzo (zeroRISC Inc.) | ||
- Gayatri Perlin (BAE) | ||
- Silviu Chiricescu (DRAPER) | ||
- Ed Suh (Meta/Cornell) | ||
- Wajdi K. Feghali (Intel) | ||
2:30 - 3:30 | Xiaolin Xu | Invited Keynote: Andreas Olofsson, Composable chiplets and implications for disaggregated design |
3:30 - 3:40 | Break | |
3:40 - 4:45 | Fatemeh Ganji | Submitted Talks Session II |
Long Talk: Architectures for Secure Quantum Computing Systems | ||
Jakub Szefer (Yale University) | ||
Short Talk: 1/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits | ||
Dev Mehta, Mohammad Hashemi, Domenic Forte, Shahin Tajik and Fatemeh Ganji (Worcester Polytechnic Institute) | ||
Long Talk: Protecting Sensors from Electromagnetic Side-channel Leakage | ||
Yan Long and Kevin Fu (Northeastern University) | ||
Short Talk: On the Feasibility of Golden-free PCB Verification | ||
Maryam Saadat Safa, Patrick Schaumont and Shahin Tajik (Worcester Polytechnic Institute) | ||
Long Talk: EntryBleed: A Universal KASLR Bypass against KPTI on Linux | ||
William Liu, Joseph Ravichandran and Mengjia Yan (Massachusetts Institute of Technology) | ||
4:45 - 5:00 | Qiaoyan Yu and Koksal Mus | Best Poster Award and Closing Remarks |
5:00 - 6:00 | Networking reception |
Extending FPGA Information Leaks with Trojan Phantom Circuits, Anthony Etim, Shanquan Tian and Jakub Szefer
NNTesting: Neural Network Fault Attacks Detection Using Gradient-Based Test Vector Generation, Antian Wang and Yingjie Lao
VertexSerum: Poisoning Graph Neural Networks for Link Inference, Ruyi Ding, Shijin Duan, Xiaolin Xu and Yunsi Fei
USBSnoop: Revealing Devices Activities via USB Congestion, Davis Ranney and Yufei Wang
TrustZoneTunnel: A Cross-world Pattern History Table-based Microarchitectural Side-channel Attack, Tianhong Xu and Yunsi Fei
SiliconEchoes: Non-Invasive Trojan and Tamper Detection using Frequency-Selective Impedance Analysis, Tahoura Mosavirik, Saleh Khalaj Monfared, Maryam Saadat Safa and Shahin Tajik
Voltage-Drop Attack Mitigation in Multi-Tenant FPGA Environments, Mashrafi Alam Kajol, Sandeep Sunkavilli and Qiaoyan Yu
Information Leakage in Quantum Computers, Chuanqi Xu and Jakub Szefer
PQC-DSA in Hardware, Sanjay Deshpande, James Howe, Cansu Karakuzu, Yongseok Lee, Yunheung Paek, Jakub Szefer and Dongze Yue
LightEMU: Hardware-Assisted Fuzzing of Trusted Applications, Haoqi Shan, Sravani Nissankarararao, Yujia Liu, Moyao Huang, Shuo Wang, Yier Jin and Dean Sullivan
Power Side-Channel Attacks on Quantum Computer Controllers & Quantum Circuit Reconstructions, Ferhat Erata, Chuanqi Xu, Ruzica Piskac and Jakub Szefer
HeisenTrojans: A New Class of Hardware Attacks, Akshita Mavurapu, Haoqi Shan, Xiaolong Guo, Orlando Arias and Dean Sullivan
Dynamic Attack Resilience for New FPGA Use Model, Sandeep Sunkavilli, Nishanth Chennagouni and Qiaoyan Yu
SoteriaQ: Securing Quantum Circuits, Theodoros Trochatos
Developing a Threat Model of Laser-Induced Acoustic Interference in Computer Vision-Assisted Vehicles, Nina Shamsi, Kaeshav Chandrasekar, Yan Long, Christopher Limbach, Keith Rebello, Kevin Fu
A Hybrid Neural Network for Simultaneous Multi-Attack Detection in Sensor Networks, Nishanth Chennagouni, Mohammad Monjur, Wei Lu and Qiaoyan Yu
Homomorphic Encryption Dataflow Optimizations With Evaluation on the Ring Processing Unit (RPU), Negar Neda, Austin Ebel and Brandon Reagen
Efficient Privacy-preserving NN Inference at the Edge, Antonio Torres, Mohammad Hashemi and Fatemeh Ganji
Too Hot To Be True: Temperature Calibration for Higher Confidence in NN-assisted Side-channel Analysis, Seyedmohammad Nouraniboosjin and Fatemeh Ganji
T-Scope: Side-channel Leakage Assessment with a Hardware-accelerated Online TVLA Test, Hao Wang, Andrew Malnicof and Patrick Schaumont
SCAPEgoat: A Side Channel Analysis Library, Trey Marcantonio, Samuel Karkache, Amit Virchandbhai Prajapati, Dev Mehta, Dillibabu Shanmugam, Mohammad Hashemi, Fatemeh Ganji and Patrick Schaumont
CAPRI6: An ASIC for Fault Root-Causing, Zhenyuan Liu, Dillibabu Shanmugam, Adithya Ramesh and Patrick Schaumont
Energy Detection-Based Framework for Detecting and Mitigating Jamming Attacks in Ultra-Low Power IoT Systems, Shabd Swaroop Kandarpa, Ankit Mittal and Aatmesh Shrivastava
Architecting GPUs for Practical Fully Homomorphic Encryption, Aymane El Jerari, Frank Rossi, Kaustubh Shivdikar, Alexander Ingare and David Kaeli
Microscope: Causality Inference Crossing the Hardware and Software Boundary from Hardware Perspective, Zhaoxiang Liu, Kejun Chen, Dean Sullivan, Orlando Arias and Xiaolong Guo
CAPRI6: Front-end, Simulation and Back-end, Dillibabu Shanmugam, Zhenyuan Liu, Adithya Ramesh and Patrick Schaumont
Decoding Processor Secrets: Exploring Side-Channel Vulnerabilities in Instructions, Arna Roy, Zhenyuan Charlotte Liu and Patrick Schaumont
CAPRI6: FPGA prototyping a 6-core MSP430 for Fault Root Cause Analysis, Adithya Ramesh, Zhenyuan Liu, Dillibabu Shanmugam and Patrick Schaumont
SoteriaQ: Securing Quantum Circuits, Theodoros Trochatos, Chuanqi Xu, Sanjay Deshpande, Yao Lu, Yongshan Ding and Jakub Szefer
Leveraging Large Language Models for Addressing Hardware Security Challenges, Weimin Fu, Xuan Zhang and Xiaolong Guo
Fault+Probe: A Generic Rowhammer-based Bit Recovery Attack, Kemal Derya, M. Caner Tol and Berk Sunar
When Memory Mappings Attack: On the (Mis)use of the ARM Cortex-M FPB Unit, Haoqi Shan, Dean Sullivan and Orlando Arias