Program

Time Session Chair Session Details
9:00 - 9:15 Yingjie Lao Welcome Remarks
9:15 - 9:30 Yingjie Lao Opening remarks by Dean Kyongbum Lee
    News from the NEHWS Community
9:30 - 10:30 Berk Sunar and Panel Discussion: “The Geopolitics of Hardware Security”
  Patrick Schaumont - Junfeng Fan (Open Security Research)
    - Jeyavijayan (JV) Rajendran (Texas A&M University Engineering)
    - Ahmad-Reza Sadeghi (Technical University of Darmstadt)
    - Sandeep Shukla (International Institute of Information Technology - Hyderabad)
10:30 - 10:45   Break
10:45 - 12:00 Dean Sullivan Submitted Talks — Session I
    Long Talk: Securing Cryptographic Software via Typed Assembly Language
    Shixin Song, Tingzhen Dong, Kori Nwabueze, Julian Zanders, Andres Erbsen, Adam Chipala and Mingjie Yan
    Short Talk: A New Wave: Symbolic Wavelets for Key Extraction in Noisy Environments
    Lil Peeter and Fatemah Ganji
    Long Talk: Leveraging AI ASICs for Homomorphic Encryption
    Jianming Tong, Tianhao Huang, Jingtian Dang, Leo de Castro, Anirudh Itagi, Anupam Golder, Asra Ali, Jeremy Kun, Jeven Jiang, Shruthi Gorantala, Baiyu Li, Arvind Arvind, Edward Suh and Tushar Krishna
    Short Talk: Power Side-Channel and Fault Attacks Against Protected ML-DSA Implementations
    Vincent Quentin Ulitzsch
    Long Talk: Graph in the Vault: Protecting Edge GNN Inference with Trusted Execution
    Tianhong Xu, Ruyi Ding and Yunsi Fei
    Short Talk: Exploiting BRAM Data Remanence for Cross-Tenant Attacks
    Bharadwaj Madabhushi, Chandra Sekhar Mummidi and Sandip Kundu
12:00 - 1:30   Lunch and Poster Session
1:30 - 2:30 Dean Sullivan Invited Keynote by Ryan Kastner (UCSD)
2:30 - 2:40   Break
2:40 - 3:45 Prabuddha Submitted Talks— Session II
  Chakraborty Long Talk: MoEcho: Exploiting Side-Channel Attacks to Compromise User Privacy in Mixture-of-Experts LLMs
    Ruyi Ding, Tianhong Xu and Yunsi Fei
    Short Talk: Defeating Transient Execution Attacks by Limiting Secret Reachability through REGISTER HIDING and SHADOWCFI
    Daniel Trujillo, Jagadash Korea, David Kaplan and Mengjie Yan
    Long Talk: ShadowScopre: Robust GPU Monitoring and Validation via Composable Side-Channel Signals
    Yichang Zhang, Ghadeer Almusaddar, Saber Ganjisaffar, Barry Williams, Yu David Liu, Dmitry Ponomarev and Noel Abu-Ghazeleh
    Short Talk: GlitchSnipe: Toward Localized Voltage Fault
    Fatemeh Khojasteh Dana, Saleh Khalsa Monfared, Hamed Okhravi and Shahin Tajik
    Long Talk: Reverse Engineering DVFS Mechanisms
    Ryan Piersma, Tawid Bhuiyan, Tanvir Ahmed and Simha Sethumadhavan
3:45 - 4:45 Shahin Tajik Invited Keynote by Yuval Yarom (RUB)
4:45 - 5:00 Seetal Potluri and Yingjie Lao Best Poster Award and Closing Remarks



Accepted Posters

  • Securing Cryptographic Software via Typed Assembly Language
    Shixin Song, Tingzhen Dong, Kosi Nwabueze, Julian Zanders, Andres Erbsen, Adam Chlipala and Mengjia Yan

  • Power Side-Channel and Fault Attacks Against Protected ML-DSA Implementations
    Vincent Quentin Ulitzsch

  • I Know What You Are Reading: Evaluating Readout Crosstalk in Cloud-based Quantum Computers
    Yizhuo Tan and Jakub Szefer

  • TraceQ: Trace-Based Reconstruction of Quantum Circuit Dataflow in Surface-Code Fault-Tolerant Quantum Computing
    Theodoros Trochatos, Christopher Kang, Andrew Wang, Frederic T. Chong and Jakub Szefer

  • Fault Injection Attacks on Q-Learning: Analysis, Vulnerabilities, and Countermeasures
    Tom Slooff, Anthony Etim, Jiaqi Yu, Francesco Regazzoni and Jakub Szefer

  • HoloCode: Hybrid Optical-Electronic Edge Encoding for Privacy-Preserving Cloud Training
    Ruofan Xing, Arman Akbari, Weikai Lin, Adith Boloor, Alexander Montes McNeil, Michael Moebius, Yongmin Liu, Yuhao Zhu and Xuan Zhang

  • Semantic Mutation and Systematic Evaluation of Automated Hardware Repair
    Maisha Mastora and Dean Sullivan

  • A Post-Silicon Side-Channel Validation Framework for Cryptographic Accelerators
    Hubert Liu, Snehashis Roy and Patrick Schaumont

  • Explainable AI Driven Power Side-Channel Estimation and Mitigation for Secure Digital Hardware
    Tanzim Mahfuz, Sudipta Paria, Tasneem Suha, Swarup Bhunia and Prabuddha Chakraborty

  • Defeating Transient Execution Attacks by Limiting Secret Reachability through REGISTER HIDING and SHADOWCFI
    Daniel Trujillo, Jagadish Kotra, David Kaplan and Mengjia Yan

  • Accelerating FrodoKEM in Hardware
    Sanjay Deshpande, Patrick Longa and Jakub Szefer

  • SquareLoop: Explore Optimal Authentication Block Strategy for ML
    Jan Strzeszynski, Jianming Tong, Kyungmi Lee, Nathan Xiong, Angshuman Parashar, Joel S. Emer, Tushar Krishna and Mengjia Yan

  • Attacking CPU–iGPU Shared-Memory DNN Inference in Intel Heterogeneous Systems
    Yufei Wang and Yunsi Fei

  • Protecting Analog Circuits using Switch Mode Time Domain Locking
    Utkarsh Kumar and Aatmesh Shrivastava

  • BLADE: Bit-level Fault Analysis via Differentiable Estimation
    Zafaryab Haider, Md Hafizur Rahman, Shane Moeykens, Vijay Devabhaktuni and Prabuddha Chakraborty

  • Compass: Navigating the Design Space of Taint Schemes for RTL Security Verification
    Yuheng Yang, Qinhan Tan, Thomas Bourgeat, Sharad Malik and Mengjia Yan

  • CacheBlitz: Reinforcement Learning for Cache Contention Attack Optimization
    Shayan Chatiwala and Mulong Luo

  • Cartographer: Enumerating Scan Chains for Visibility Into the Register Layer of Commercial ICs During Fault Injection
    Thei Riley, Dillibabu Shanmugam and Patrick Schaumont

  • WAVE: Leveraging Architecture Observation for Privacy-Preserving Model Oversight
    Haoxuan Xu, Chen Gong, Beijie Liu, Haizhong Zheng, Beidi Chen and Mengyuan Li

  • Fault Injection Attacks and Countermeasures on TinyML Algorithms
    Anthony Etim, Srilalith Nampally, Aubtin Rasouli, Dustin Mazza, Krishna Chilakapati, Tinghung Chiu, Ferhat Erata, Leyla Nazhandali, Wenjie Xiong and Jakub Szefer

  • Protecting Localized Reasoning Engines as Critical IP in LLM-Assisted EDA
    Weimin Fu and Xiaolong Guo

  • FANBLEED: Stealing Your Secrets via Observing Your Cooling Fan
    Sisheng Liang, Zhengxiong Li, Zihao Zhan and Zhenkai Zhang