Top Picks in Hardware and Embedded Security

Co-located with the 2022 International Conference On Computer Aided Design (ICCAD 2022)

Home   Selection  Organization  FAQs  Candidates  Program 


Workshop Agenda

TimeEvent
8:30 a.m. - 8:45 a.m.Opening/welcome
8:45 a.m. - 9:45 a.m.Session 1: Side channel analysis

  • Make Some Noise. Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis, Shivam Bhasin

  • CaSA: End-to-end Quantitative Security Analysis of Randomly Mapped Caches, Yuheng Yang
  • 9:45 a.m. - 11:15 a.m.Session 2: Frameworks and architectural support for security

  • Aker: A Design and Verification Framework for Safe and Secure SoC Access Control, Andy Meza

  • No-FAT: Architectural Support for Low Overhead Memory Safety Checks, Miguel Arroyo

  • Keystone: An Open Framework for Architecting Trusted Execution Environments, David Kohlbrenner
  • 11:15 a.m. - 11:30 a.m.Break
    11:30 a.m. - 12:30 p.m.Session 3: Speculative execution attacks

  • An Analysis of Speculative Type Confusion Vulnerabilities in the Wild, Adam Morrison

  • Microarchitectural Attack Synthesis with Happens-Before Analysis, Caroline Trippel
  • 12:30 p.m. - 1:30 p.m.Lunch
    1:30 p.m. - 3:00 p.m.Session 4: Side channel attacks

  • FPGA-Based Remote Power Side-Channel Attacks, Mark Zhao

  • A2: Analog Malicious Hardware, Kaiyuan Yang

  • Stealthy Tracking of Autonomous Vehicles with Cache Side Channels, Mulong Luo
  • 3:00 p.m. - 3:15 p.m.Closing remark/next steps