8:00-8:30 Breakfast/Registration |
8:30-8:45 Introduction |
8:30-8:45 |
Overview of the Top Picks |
Rosario Cammarota (Intel AI Research) and Francesco Regazzoni (ALaRI - USI) |
8:45-9:30 Keynote |
8:45-9:30 |
Hardware is the New Software: Finding Exploitable Bugs in Hardware Designs |
Cynthia Sturton, University of North Carolina |
9:30-10:30 Session One: Microarchitectural Side- and Covert-Channel Analysis |
9:30-10:00 |
Prefetch-guard: Leveraging hardware prefetchers to defend against cache timing channels. |
Hongyu Fang (speaker), Sai Santosh Dayapule, Fan Yao, Milos Doroslovacki and Guru Venkataramani |
10:00-10:30 |
Rendered Insecure: Side Channel Attacks are Practical on GPUs. |
Hoda Naghibijouybari (speaker), Ajaya Neupane, Zhiyun Qian and Nael Abu-Ghazaleh |
10:30-10:40 Coffee Break |
10:40-12:10 Session Two: End-to-end Defense Lines in Hardware Security |
10:40-11:10 |
End-to-End Automated Exploit Generation for Validating the Security of Processor Designs. |
Rui Zhang (speaker), Calvin Deutschbein, Peng Huang and Cynthia Sturton |
11:10-11:40 |
DeepFense: online accelerated defense against adversarial deep learning. |
Bita Darvish Rouhani, Mohammad Samragh, Mojan Javaheripi, Tara Javidi, Farinaz Koushanfar (speaker) |
11:40-12:10 |
Hardware Performance Counters Can Detect Malware: Myth or Fact? |
Boyou Zhou (speaker), Anmol Gupta, Rasoul Jahanshahi, Manuel Egele and Ajay Joshi |
12:10-13:10 Lunch |
13:10-14:10 Panel |
13:10-14:10 |
How do we evaluate the impact of hardware security research? |
Moderators: Rosario Cammarota (Intel AI Research) and Francesco Regazzoni (ALaRI - USI) |
Panelists: Bita Rouhani (Microsoft Research), Rei Ueno (Tohoku University), JV Ravendran (Texas A&M University), Mengmei Ye (Rutgers University) |
14:10-15:10 Session Three: Security of IP Protection Techniques for IC and ML |
14:10-14:40 |
Security Analysis of IC Camouflaging. |
Jeyavijayan Rajendran (speaker), Ramesh Karri and Ozgur Sinanoglu |
14:40-15:10 |
DeepSigns: An End-to-End Watermarking Framework for Ownership Protection of Deep Neural Networks. |
Bita Darvish Rouhani (speaker), Huili Chen and Farinaz Koushanfar |
14:10-15:10 Session Four: Physical Side-Channel Analysis |
15:10-15:40 |
An Inside Job: Remote Power Analysis Attacks on FPGAs. |
Falk Schellenberg, Dennis R.E. Gnad (speaker), Amir Moradi and Mehdi B. Tahoori |
15:40-16:10 |
High Efficiency Power Side-Channel Attack Immunity using Noise Injection in Attenuated Signature Domain. |
Debayan Das (speaker), Shovan Maity, Saad Bin Nasir, Santosh Ghosh, Arijit Raychowdhury and Shreyas Sen |
16:10-16:20 Coffee Break |
16:20-17:20 Session Five: Cryptographic Hardware |
16:20-16:50 |
Run-time Accessible DRAM PUFs in Commodity Devices. |
Wenjie Xiong (speaker), Andre Schaller, Nikolaos Athanasios Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser and Jakub Szefer |
16:50-17:20 |
Automatic Generation of Formally-Proven Tamper-Resistant Galois-Field Multipliers Based on Generalized Masking Scheme. |
Rei Ueno (speaker), Naofumi Homma, Sumio Morioka and Takafumi Aoki |
17:20-17:30 Closing Remarks |
17:20-17:30 |
Closing Remarks and Next Steps |
Rosario Cammarota (Intel AI Research) and Francesco Regazzoni (ALaRI - USI) |