Top Picks in Hardware and Embedded Security

Co-located with 2019 International Conference On Computer Aided Design

7th November 2019, Westminster, CO, United States

Home Selection Process Important Dates Organization Submissions Venue FAQs Top Pick candidates Program


Workshop Program

8:00-8:30 Breakfast/Registration

8:30-8:45 Introduction

8:30-8:45
Overview of the Top Picks
Rosario Cammarota (Intel AI Research) and Francesco Regazzoni (ALaRI - USI)

8:45-9:30 Keynote

8:45-9:30
Hardware is the New Software: Finding Exploitable Bugs in Hardware Designs
Cynthia Sturton, University of North Carolina

9:30-10:30 Session One: Microarchitectural Side- and Covert-Channel Analysis

9:30-10:00
Prefetch-guard: Leveraging hardware prefetchers to defend against cache timing channels.
Hongyu Fang (speaker), Sai Santosh Dayapule, Fan Yao, Milos Doroslovacki and Guru Venkataramani
10:00-10:30
Rendered Insecure: Side Channel Attacks are Practical on GPUs.
Hoda Naghibijouybari (speaker), Ajaya Neupane, Zhiyun Qian and Nael Abu-Ghazaleh

10:30-10:40 Coffee Break

10:40-12:10 Session Two: End-to-end Defense Lines in Hardware Security

10:40-11:10
End-to-End Automated Exploit Generation for Validating the Security of Processor Designs.
Rui Zhang (speaker), Calvin Deutschbein, Peng Huang and Cynthia Sturton
11:10-11:40
DeepFense: online accelerated defense against adversarial deep learning.
Bita Darvish Rouhani, Mohammad Samragh, Mojan Javaheripi, Tara Javidi, Farinaz Koushanfar (speaker)
11:40-12:10
Hardware Performance Counters Can Detect Malware: Myth or Fact?
Boyou Zhou (speaker), Anmol Gupta, Rasoul Jahanshahi, Manuel Egele and Ajay Joshi

12:10-13:10 Lunch

13:10-14:10 Panel

13:10-14:10
How do we evaluate the impact of hardware security research?
Moderators: Rosario Cammarota (Intel AI Research) and Francesco Regazzoni (ALaRI - USI)
Panelists: Bita Rouhani (Microsoft Research), Rei Ueno (Tohoku University), JV Ravendran (Texas A&M University), Mengmei Ye (Rutgers University)

14:10-15:10 Session Three: Security of IP Protection Techniques for IC and ML

14:10-14:40
Security Analysis of IC Camouflaging.
Jeyavijayan Rajendran (speaker), Ramesh Karri and Ozgur Sinanoglu
14:40-15:10
DeepSigns: An End-to-End Watermarking Framework for Ownership Protection of Deep Neural Networks.
Bita Darvish Rouhani (speaker), Huili Chen and Farinaz Koushanfar

14:10-15:10 Session Four: Physical Side-Channel Analysis

15:10-15:40
An Inside Job: Remote Power Analysis Attacks on FPGAs.
Falk Schellenberg, Dennis R.E. Gnad (speaker), Amir Moradi and Mehdi B. Tahoori
15:40-16:10
High Efficiency Power Side-Channel Attack Immunity using Noise Injection in Attenuated Signature Domain.
Debayan Das (speaker), Shovan Maity, Saad Bin Nasir, Santosh Ghosh, Arijit Raychowdhury and Shreyas Sen

16:10-16:20 Coffee Break

16:20-17:20 Session Five: Cryptographic Hardware

16:20-16:50
Run-time Accessible DRAM PUFs in Commodity Devices.
Wenjie Xiong (speaker), Andre Schaller, Nikolaos Athanasios Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser and Jakub Szefer
16:50-17:20
Automatic Generation of Formally-Proven Tamper-Resistant Galois-Field Multipliers Based on Generalized Masking Scheme.
Rei Ueno (speaker), Naofumi Homma, Sumio Morioka and Takafumi Aoki

17:20-17:30 Closing Remarks

17:20-17:30
Closing Remarks and Next Steps
Rosario Cammarota (Intel AI Research) and Francesco Regazzoni (ALaRI - USI)