Program

  Session Chair  
9:00 - 9:15 Shahin Tajik Welcome Remarks
9:15 - 9:30 Fatemeh Ganji Opening remarks by Ben Linville-Engler (MassTech) “ME Commons and CHIPS Act”
    News from the NEHWS Community
9:30 - 10:30 Fatemeh Ganji Invited Keynote: Sharad Malik, Don’t Trust, and Verify
10:30 - 10:45   Break
10:45 - 12:00 Xiaolin Xu Submitted Talks Session I
    Long Talk: Breaching Privacy: Memory Scraping Attack on Xilinx FPGAs
    Bharadwaj Madabhushi, Sandip Kundu and Daniel Holcomb (University of Massachusetts Amherst)
    Short Talk: Driving into The Unknown: Investigating and Addressing Security Breaches in Vehicle Infotainment System
    Yingjie Cao, Haoqi Shan, Maisha Mastora and Dean Sullivan (University of New Hampshire)
    Long Talk: Deep-learning Model Extraction through Software-based Power Side-channel
    Xiang Zhang, A. Adam Ding and Yunsi Fei (Northeastern University)
    Short Talk: SecureLoop: Design Space Exploration of Secure DNN Accelerators
    Kyungmi Lee, Mengjia Yan, Joel Emer and Anantha Chandrakasan (Massachusetts Institute of Technology)
    Long Talk: LeakyOhm: Secret Bits Extraction using Impedance Analysis
    Saleh Khalaj Monfared, Tahoura Mosavirik and Shahin Tajik (Worcester Polytechnic Institute)
    Short Talk: A Full-Stack Approach for Side-Channel Secure ML Hardware
    Anuj Dubey and Aydin Aysu (North Carolina State University)
12:00 - 1:30   Lunch and Poster Session
1:30 - 2:30 Mengjia Yan Panel Discussion: The Good and the Bad of Hardware Security
    Panelists:
    - Dominic Rizzo (zeroRISC Inc.)
    - Gayatri Perlin (BAE)
    - Silviu Chiricescu (DRAPER)
    - Ed Suh (Meta/Cornell)
    - Wajdi K. Feghali (Intel)
2:30 - 3:30 Xiaolin Xu Invited Keynote: Andreas Olofsson, Composable chiplets and implications for disaggregated design
3:30 - 3:40   Break
3:40 - 4:45 Fatemeh Ganji Submitted Talks Session II
    Long Talk: Architectures for Secure Quantum Computing Systems
    Jakub Szefer (Yale University)
    Short Talk: 1/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits
    Dev Mehta, Mohammad Hashemi, Domenic Forte, Shahin Tajik and Fatemeh Ganji (Worcester Polytechnic Institute)
    Long Talk: Protecting Sensors from Electromagnetic Side-channel Leakage
    Yan Long and Kevin Fu (Northeastern University)
    Short Talk: On the Feasibility of Golden-free PCB Verification
    Maryam Saadat Safa, Patrick Schaumont and Shahin Tajik (Worcester Polytechnic Institute)
    Long Talk: EntryBleed: A Universal KASLR Bypass against KPTI on Linux
    William Liu, Joseph Ravichandran and Mengjia Yan (Massachusetts Institute of Technology)
4:45 - 5:00 Qiaoyan Yu and Koksal Mus Best Poster Award and Closing Remarks
5:00 - 6:00   Networking reception


Posters

  • Extending FPGA Information Leaks with Trojan Phantom Circuits, Anthony Etim, Shanquan Tian and Jakub Szefer

  • NNTesting: Neural Network Fault Attacks Detection Using Gradient-Based Test Vector Generation, Antian Wang and Yingjie Lao

  • VertexSerum: Poisoning Graph Neural Networks for Link Inference, Ruyi Ding, Shijin Duan, Xiaolin Xu and Yunsi Fei

  • USBSnoop: Revealing Devices Activities via USB Congestion, Davis Ranney and Yufei Wang

  • TrustZoneTunnel: A Cross-world Pattern History Table-based Microarchitectural Side-channel Attack, Tianhong Xu and Yunsi Fei

  • SiliconEchoes: Non-Invasive Trojan and Tamper Detection using Frequency-Selective Impedance Analysis, Tahoura Mosavirik, Saleh Khalaj Monfared, Maryam Saadat Safa and Shahin Tajik

  • Voltage-Drop Attack Mitigation in Multi-Tenant FPGA Environments, Mashrafi Alam Kajol, Sandeep Sunkavilli and Qiaoyan Yu

  • Information Leakage in Quantum Computers, Chuanqi Xu and Jakub Szefer

  • PQC-DSA in Hardware, Sanjay Deshpande, James Howe, Cansu Karakuzu, Yongseok Lee, Yunheung Paek, Jakub Szefer and Dongze Yue

  • LightEMU: Hardware-Assisted Fuzzing of Trusted Applications, Haoqi Shan, Sravani Nissankarararao, Yujia Liu, Moyao Huang, Shuo Wang, Yier Jin and Dean Sullivan

  • Power Side-Channel Attacks on Quantum Computer Controllers & Quantum Circuit Reconstructions, Ferhat Erata, Chuanqi Xu, Ruzica Piskac and Jakub Szefer

  • HeisenTrojans: A New Class of Hardware Attacks, Akshita Mavurapu, Haoqi Shan, Xiaolong Guo, Orlando Arias and Dean Sullivan

  • Dynamic Attack Resilience for New FPGA Use Model, Sandeep Sunkavilli, Nishanth Chennagouni and Qiaoyan Yu

  • SoteriaQ: Securing Quantum Circuits, Theodoros Trochatos

  • Developing a Threat Model of Laser-Induced Acoustic Interference in Computer Vision-Assisted Vehicles, Nina Shamsi, Kaeshav Chandrasekar, Yan Long, Christopher Limbach, Keith Rebello, Kevin Fu

  • A Hybrid Neural Network for Simultaneous Multi-Attack Detection in Sensor Networks, Nishanth Chennagouni, Mohammad Monjur, Wei Lu and Qiaoyan Yu

  • Homomorphic Encryption Dataflow Optimizations With Evaluation on the Ring Processing Unit (RPU), Negar Neda, Austin Ebel and Brandon Reagen

  • Efficient Privacy-preserving NN Inference at the Edge, Antonio Torres, Mohammad Hashemi and Fatemeh Ganji

  • Too Hot To Be True: Temperature Calibration for Higher Confidence in NN-assisted Side-channel Analysis, Seyedmohammad Nouraniboosjin and Fatemeh Ganji

  • T-Scope: Side-channel Leakage Assessment with a Hardware-accelerated Online TVLA Test, Hao Wang, Andrew Malnicof and Patrick Schaumont

  • SCAPEgoat: A Side Channel Analysis Library, Trey Marcantonio, Samuel Karkache, Amit Virchandbhai Prajapati, Dev Mehta, Dillibabu Shanmugam, Mohammad Hashemi, Fatemeh Ganji and Patrick Schaumont

  • CAPRI6: An ASIC for Fault Root-Causing, Zhenyuan Liu, Dillibabu Shanmugam, Adithya Ramesh and Patrick Schaumont

  • Energy Detection-Based Framework for Detecting and Mitigating Jamming Attacks in Ultra-Low Power IoT Systems, Shabd Swaroop Kandarpa, Ankit Mittal and Aatmesh Shrivastava

  • Architecting GPUs for Practical Fully Homomorphic Encryption, Aymane El Jerari, Frank Rossi, Kaustubh Shivdikar, Alexander Ingare and David Kaeli

  • Microscope: Causality Inference Crossing the Hardware and Software Boundary from Hardware Perspective, Zhaoxiang Liu, Kejun Chen, Dean Sullivan, Orlando Arias and Xiaolong Guo

  • CAPRI6: Front-end, Simulation and Back-end, Dillibabu Shanmugam, Zhenyuan Liu, Adithya Ramesh and Patrick Schaumont

  • Decoding Processor Secrets: Exploring Side-Channel Vulnerabilities in Instructions, Arna Roy, Zhenyuan Charlotte Liu and Patrick Schaumont

  • CAPRI6: FPGA prototyping a 6-core MSP430 for Fault Root Cause Analysis, Adithya Ramesh, Zhenyuan Liu, Dillibabu Shanmugam and Patrick Schaumont

  • SoteriaQ: Securing Quantum Circuits, Theodoros Trochatos, Chuanqi Xu, Sanjay Deshpande, Yao Lu, Yongshan Ding and Jakub Szefer

  • Leveraging Large Language Models for Addressing Hardware Security Challenges, Weimin Fu, Xuan Zhang and Xiaolong Guo

  • Fault+Probe: A Generic Rowhammer-based Bit Recovery Attack, Kemal Derya, M. Caner Tol and Berk Sunar

  • When Memory Mappings Attack: On the (Mis)use of the ARM Cortex-M FPB Unit, Haoqi Shan, Dean Sullivan and Orlando Arias