| Time | Session Chair | Session Details |
|---|---|---|
| 9:00 - 9:15 | Yingjie Lao | Welcome Remarks |
| 9:15 - 9:30 | Yingjie Lao | Opening remarks by Dean Kyongbum Lee |
| News from the NEHWS Community | ||
| 9:30 - 10:30 | Berk Sunar and | Panel Discussion: “The Geopolitics of Hardware Security” |
| Patrick Schaumont | - Junfeng Fan (Open Security Research) | |
| - Jeyavijayan (JV) Rajendran (Texas A&M University Engineering) | ||
| - Ahmad-Reza Sadeghi (Technical University of Darmstadt) | ||
| - Sandeep Shukla (International Institute of Information Technology - Hyderabad) | ||
| 10:30 - 10:45 | Break | |
| 10:45 - 12:00 | Dean Sullivan | Submitted Talks — Session I |
| Long Talk: Securing Cryptographic Software via Typed Assembly Language | ||
| Shixin Song, Tingzhen Dong, Kori Nwabueze, Julian Zanders, Andres Erbsen, Adam Chipala and Mingjie Yan | ||
| Short Talk: A New Wave: Symbolic Wavelets for Key Extraction in Noisy Environments | ||
| Lil Peeter and Fatemah Ganji | ||
| Long Talk: Leveraging AI ASICs for Homomorphic Encryption | ||
| Jianming Tong, Tianhao Huang, Jingtian Dang, Leo de Castro, Anirudh Itagi, Anupam Golder, Asra Ali, Jeremy Kun, Jeven Jiang, Shruthi Gorantala, Baiyu Li, Arvind Arvind, Edward Suh and Tushar Krishna | ||
| Short Talk: Power Side-Channel and Fault Attacks Against Protected ML-DSA Implementations | ||
| Vincent Quentin Ulitzsch | ||
| Long Talk: Graph in the Vault: Protecting Edge GNN Inference with Trusted Execution | ||
| Tianhong Xu, Ruyi Ding and Yunsi Fei | ||
| Short Talk: Exploiting BRAM Data Remanence for Cross-Tenant Attacks | ||
| Bharadwaj Madabhushi, Chandra Sekhar Mummidi and Sandip Kundu | ||
| 12:00 - 1:30 | Lunch and Poster Session | |
| 1:30 - 2:30 | Dean Sullivan | Invited Keynote by Ryan Kastner (UCSD) |
| 2:30 - 2:40 | Break | |
| 2:40 - 3:45 | Prabuddha | Submitted Talks— Session II |
| Chakraborty | Long Talk: MoEcho: Exploiting Side-Channel Attacks to Compromise User Privacy in Mixture-of-Experts LLMs | |
| Ruyi Ding, Tianhong Xu and Yunsi Fei | ||
| Short Talk: Defeating Transient Execution Attacks by Limiting Secret Reachability through REGISTER HIDING and SHADOWCFI | ||
| Daniel Trujillo, Jagadash Korea, David Kaplan and Mengjie Yan | ||
| Long Talk: ShadowScopre: Robust GPU Monitoring and Validation via Composable Side-Channel Signals | ||
| Yichang Zhang, Ghadeer Almusaddar, Saber Ganjisaffar, Barry Williams, Yu David Liu, Dmitry Ponomarev and Noel Abu-Ghazeleh | ||
| Short Talk: GlitchSnipe: Toward Localized Voltage Fault | ||
| Fatemeh Khojasteh Dana, Saleh Khalsa Monfared, Hamed Okhravi and Shahin Tajik | ||
| Long Talk: Reverse Engineering DVFS Mechanisms | ||
| Ryan Piersma, Tawid Bhuiyan, Tanvir Ahmed and Simha Sethumadhavan | ||
| 3:45 - 4:45 | Shahin Tajik | Invited Keynote by Yuval Yarom (RUB) |
| 4:45 - 5:00 | Seetal Potluri and Yingjie Lao | Best Poster Award and Closing Remarks |
Securing Cryptographic Software via Typed Assembly Language
Shixin Song, Tingzhen Dong, Kosi Nwabueze, Julian Zanders, Andres Erbsen, Adam Chlipala and Mengjia Yan
Power Side-Channel and Fault Attacks Against Protected ML-DSA Implementations
Vincent Quentin Ulitzsch
I Know What You Are Reading: Evaluating Readout Crosstalk in Cloud-based Quantum Computers
Yizhuo Tan and Jakub Szefer
TraceQ: Trace-Based Reconstruction of Quantum Circuit Dataflow in Surface-Code Fault-Tolerant Quantum Computing
Theodoros Trochatos, Christopher Kang, Andrew Wang, Frederic T. Chong and Jakub Szefer
Fault Injection Attacks on Q-Learning: Analysis, Vulnerabilities, and Countermeasures
Tom Slooff, Anthony Etim, Jiaqi Yu, Francesco Regazzoni and Jakub Szefer
HoloCode: Hybrid Optical-Electronic Edge Encoding for Privacy-Preserving Cloud Training
Ruofan Xing, Arman Akbari, Weikai Lin, Adith Boloor, Alexander Montes McNeil, Michael Moebius, Yongmin Liu, Yuhao Zhu and Xuan Zhang
Semantic Mutation and Systematic Evaluation of Automated Hardware Repair
Maisha Mastora and Dean Sullivan
A Post-Silicon Side-Channel Validation Framework for Cryptographic Accelerators
Hubert Liu, Snehashis Roy and Patrick Schaumont
Explainable AI Driven Power Side-Channel Estimation and Mitigation for Secure Digital Hardware
Tanzim Mahfuz, Sudipta Paria, Tasneem Suha, Swarup Bhunia and Prabuddha Chakraborty
Defeating Transient Execution Attacks by Limiting Secret Reachability through REGISTER HIDING and SHADOWCFI
Daniel Trujillo, Jagadish Kotra, David Kaplan and Mengjia Yan
Accelerating FrodoKEM in Hardware
Sanjay Deshpande, Patrick Longa and Jakub Szefer
SquareLoop: Explore Optimal Authentication Block Strategy for ML
Jan Strzeszynski, Jianming Tong, Kyungmi Lee, Nathan Xiong, Angshuman Parashar, Joel S. Emer, Tushar Krishna and Mengjia Yan
Attacking CPU–iGPU Shared-Memory DNN Inference in Intel Heterogeneous Systems
Yufei Wang and Yunsi Fei
Protecting Analog Circuits using Switch Mode Time Domain Locking
Utkarsh Kumar and Aatmesh Shrivastava
BLADE: Bit-level Fault Analysis via Differentiable Estimation
Zafaryab Haider, Md Hafizur Rahman, Shane Moeykens, Vijay Devabhaktuni and Prabuddha Chakraborty
Compass: Navigating the Design Space of Taint Schemes for RTL Security Verification
Yuheng Yang, Qinhan Tan, Thomas Bourgeat, Sharad Malik and Mengjia Yan
CacheBlitz: Reinforcement Learning for Cache Contention Attack Optimization
Shayan Chatiwala and Mulong Luo
Cartographer: Enumerating Scan Chains for Visibility Into the Register Layer of Commercial ICs During Fault Injection
Thei Riley, Dillibabu Shanmugam and Patrick Schaumont
WAVE: Leveraging Architecture Observation for Privacy-Preserving Model Oversight
Haoxuan Xu, Chen Gong, Beijie Liu, Haizhong Zheng, Beidi Chen and Mengyuan Li
Fault Injection Attacks and Countermeasures on TinyML Algorithms
Anthony Etim, Srilalith Nampally, Aubtin Rasouli, Dustin Mazza, Krishna Chilakapati, Tinghung Chiu, Ferhat Erata, Leyla Nazhandali, Wenjie Xiong and Jakub Szefer
Protecting Localized Reasoning Engines as Critical IP in LLM-Assisted EDA
Weimin Fu and Xiaolong Guo
FANBLEED: Stealing Your Secrets via Observing Your Cooling Fan
Sisheng Liang, Zhengxiong Li, Zihao Zhan and Zhenkai Zhang