Program

Time Session Chair Session Details
9:00 - 9:15 TBA Welcome Remarks
9:15 - 9:30 TBA Opening remarks
    News from the NEHWS Community
9:30 - 10:30 TBA Invited Keynote by Todd Austin (UMich)
10:30 - 10:45   Break
10:45 - 12:00 TBA Submitted Talks— Session I
    Long Talk: FaultDetective: Explainable to a Fault, from the Design Layout to the Software
    Zhenyuan Liu, Dillibabu Shanmugam, and Patrick Schaumont
    Short Talk: BackMon: IC Backside Tamper Detection using On-Chip Impedance Monitoring
    Tahoura Mosavirik and Shahin Tajik
    Long Talk: Who is in Control? Security Risks in Commercial ADAS
    Yingjie Cao, George Crane, Haoqi Shan, and Dean Sullivan
    Short Talk: Energy-Accuracy-Security Trade-offs in Resistive In-Memory Computing Architectures
    Saion Roy and Naresh Shanbhag
    Long Talk: VGF: Value-Guided Fuzzing – Fuzzing Hardware as Hardware
    Ruochen Dai, Michael Lee, Patrick Hoey, Weimin Fu, Yier Jin, Xiaolong Guo, Shuo Wang, Dean Sullivan, Tuba Yavuz, and Orlando Arias
    Short Talk: USBSnoop – Revealing Device Activities via USB Congestions
    Dais Ranney, Yufei Wang, A. Adam Ding, and Yunsi Fei
12:00 - 1:30   Lunch and Poster Session
1:30 - 2:30 Seetal Potluri Panel Discussion: “Secure-by-Construction for Hardware Design: Mission Impossible or Walk in the Park?”
    - Shivam Bhasin (Nanyang Technical University)
    - Srini Devadas (Massachusetts Institute of Technology)
    - Sharad Malik (Princeton University)
    - Christof Paar (Max Planck Institute)
    - Dominic Rizzo (zeroRISC)
2:30 - 3:30 TBA Invited Keynote by Ed. Suh (Nvidia)
3:30 - 3:40   Break
3:40 - 4:45 TBA Submitted Talks— Session II
    Long Talk: Exploiting Exclusive System-Level Cache in Apple M-Series SoCs for Enhanced Cache Occupancy Attacks
    Tianhong Xu, Aidong Ding, and Yunsi Fei
    Short Talk: Uncertainty Estimation in Neural Network-enabled Side-channel Analysis and Links to Interpretability
    Seyedmohammad Nouraniboosjin and Fatemeh Ganji
    Long Talk: Oreo: Protecting ASLR Against Microarchitectural Attacks
    Shixion Song, Joseph Zhang, and Mengjia Yan
    Short Talk: Cross-Layer EM Fault Injection Assessment Framework
    Hanqiu Weng, Ruochen Dai, Tuba Yavuz, Xiaolong Guo, Orlando Arias, Dean Sullivan, Siqi Dai, Honggang Yu, Michael Lee, Domenic Forte, and Shuo Wang
    Long Talk: IvLeague: Side Channel-resistant Secure Architectures Using Isolated Domains of Dynamic Integrity Trees
    Md Hafizul Islam Chowdhury and Fan Yao
4:45 - 5:45 TBA Invited Keynote by Makoto Nagata (Kobe University)
5:45 - 6:00 Yingjie Lao Best Poster Award and Closing Remarks
6:00 - 7:00   Networking reception

Accepted Posters

  • On-die Differential Sensing for Monitoring and Analysis of Dynamic Computing Environments, Shahriar Hadayeghparast, Xiang Li, Aleksa Deric, and Daniel Holcomb

  • Hardware Acceleration for Fully Homomorphic Encryption Scheme Switching from CKKS to FHEW, Kaiyuan Zhang, Antian Wang, Keshab Parhi, and Yingjie Lao

  • Logical Maneuvers: Detecting and Mitigating Adversarial Hardware Faults in Space, Fatemeh Khojasteh Dana, Saleh Khalaj Monfared, and Shahin Tajik

  • Side-channel Threats in Fault-Tolerant Quantum Computers, Theodoros Trochatos, Christopher Kang, Frederic T. Chong, and Jakub Szefer

  • Securing HHL Quantum Algorithm against Quantum Computer Attacks, Yizhuo Tan, Hrvoje Kukina, and Jakub Szefer

  • Winograd for NTT: A Case Study on Higher-Radix and Low-Latency Implementation of NTT for Post Quantum Cryptography on FPGA, Suraj Mandal and Debapriya Basu Roy

  • An On-Chip Sensor Placement Strategy for Voltage-Drop Attack Mitigation, Mashrafi Alam Kajol, Sandeep Sunkavilli, and Qiaoyan Yu

  • Fault Injection on Reinforcement Learning, Tom Slooff, Anthony Etim, Jiaqi Yu, Francesco Regazzoni, and Jakub Szefer

  • ChipletPing: On-die Digital Impedance Sensing for Chiplet and Interposer Verification, Saleh Monfared, Maryam Saadat Safa, and Shahin Tajik

  • Reverse Cross Entropy Optimizations for Efficient Adversarial Detection and Defense, Zirui Fu and Marco Donato

  • CAPRI6: A Solution for Fault Root Cause Detection, Dillibabu Shanmugam, Zhenyuan Liu, and Patrick Schaumont

  • LeakFlow: Power Side-Channel Leakage Simulation and Assessment Tool, Andrew Malnicof, Zhenyuan Liu, and Patrick Schaumont

  • Security Attacks Abusing Pulse-level Quantum Circuits, Chuanqi Xu and Jakub Szefer

  • Integrated Security Mechanisms for Weight Protection in Memristive Crossbar Arrays, Muhammad Faheemur Rahman and Wayne Burleson

  • X-DFS: Explainable Artificial Intelligence Guided Design-for-Security Solution Space Exploration, Tanzim Mahfuz and Prabuddha Chakraborty

  • LooseWire: Identifying Root Causes of Side-channel Leakage in an Open-Source FPGA, Evan Apinis, Zhenyuan Liu, and Patrick Schaumont

  • AI-enabled, Automated, and Efficient Electromagnetic Side-Channel Acquisition, Dev M. Mehta, Maryam Saadat Safa, Alessandra Savio Serpes, Seyedmohammad Nouraniboosjin, Shahin Tajik, and Fatemeh Ganji

  • Automation of Photon Emission Analysis Pipeline for Hardware Security, Spencer Harding, Keegan Kuhn, Scott West, Dev M. Mehta, Shahin Tajik, and Fatemeh Ganji

  • Chosen Cyphertext Attack on Barret Reduction in CRYSTALS-Kyber, Yashaswini Makaram, Yunsi Fei, and David Kaeli

  • Cross CPU-GPU Rowhammer Attack, Yufei Wang