8:00-8:30 Breakfast/Registration |
8:30-8:45 Introduction |
| 8:30-8:45 |
| Overview of the Top Picks |
| Rosario Cammarota (Intel AI Research) and Francesco Regazzoni (ALaRI - USI) |
8:45-9:30 Keynote |
| 8:45-9:30 |
| Hardware is the New Software: Finding Exploitable Bugs in Hardware Designs |
| Cynthia Sturton, University of North Carolina |
9:30-10:30 Session One: Microarchitectural Side- and Covert-Channel Analysis |
| 9:30-10:00 |
| Prefetch-guard: Leveraging hardware prefetchers to defend against cache timing channels. |
| Hongyu Fang (speaker), Sai Santosh Dayapule, Fan Yao, Milos Doroslovacki and Guru Venkataramani |
| 10:00-10:30 |
| Rendered Insecure: Side Channel Attacks are Practical on GPUs. |
| Hoda Naghibijouybari (speaker), Ajaya Neupane, Zhiyun Qian and Nael Abu-Ghazaleh |
10:30-10:40 Coffee Break |
10:40-12:10 Session Two: End-to-end Defense Lines in Hardware Security |
| 10:40-11:10 |
| End-to-End Automated Exploit Generation for Validating the Security of Processor Designs. |
| Rui Zhang (speaker), Calvin Deutschbein, Peng Huang and Cynthia Sturton |
| 11:10-11:40 |
| DeepFense: online accelerated defense against adversarial deep learning. |
| Bita Darvish Rouhani, Mohammad Samragh, Mojan Javaheripi, Tara Javidi, Farinaz Koushanfar (speaker) |
| 11:40-12:10 |
| Hardware Performance Counters Can Detect Malware: Myth or Fact? |
| Boyou Zhou (speaker), Anmol Gupta, Rasoul Jahanshahi, Manuel Egele and Ajay Joshi |
12:10-13:10 Lunch |
13:10-14:10 Panel |
| 13:10-14:10 |
| How do we evaluate the impact of hardware security research? |
| Moderators: Rosario Cammarota (Intel AI Research) and Francesco Regazzoni (ALaRI - USI) |
| Panelists: Bita Rouhani (Microsoft Research), Rei Ueno (Tohoku University), JV Ravendran (Texas A&M University), Mengmei Ye (Rutgers University) |
14:10-15:10 Session Three: Security of IP Protection Techniques for IC and ML |
| 14:10-14:40 |
| Security Analysis of IC Camouflaging. |
| Jeyavijayan Rajendran (speaker), Ramesh Karri and Ozgur Sinanoglu |
| 14:40-15:10 |
| DeepSigns: An End-to-End Watermarking Framework for Ownership Protection of Deep Neural Networks. |
| Bita Darvish Rouhani (speaker), Huili Chen and Farinaz Koushanfar |
14:10-15:10 Session Four: Physical Side-Channel Analysis |
| 15:10-15:40 |
| An Inside Job: Remote Power Analysis Attacks on FPGAs. |
| Falk Schellenberg, Dennis R.E. Gnad (speaker), Amir Moradi and Mehdi B. Tahoori |
| 15:40-16:10 |
| High Efficiency Power Side-Channel Attack Immunity using Noise Injection in Attenuated Signature Domain. |
| Debayan Das (speaker), Shovan Maity, Saad Bin Nasir, Santosh Ghosh, Arijit Raychowdhury and Shreyas Sen |
16:10-16:20 Coffee Break |
16:20-17:20 Session Five: Cryptographic Hardware |
| 16:20-16:50 |
| Run-time Accessible DRAM PUFs in Commodity Devices. |
| Wenjie Xiong (speaker), Andre Schaller, Nikolaos Athanasios Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser and Jakub Szefer |
| 16:50-17:20 |
| Automatic Generation of Formally-Proven Tamper-Resistant Galois-Field Multipliers Based on Generalized Masking Scheme. |
| Rei Ueno (speaker), Naofumi Homma, Sumio Morioka and Takafumi Aoki |
17:20-17:30 Closing Remarks |
| 17:20-17:30 |
| Closing Remarks and Next Steps |
| Rosario Cammarota (Intel AI Research) and Francesco Regazzoni (ALaRI - USI) |