8:30 a.m. - 8:45 a.m. | Opening/welcome |
8:45 a.m. - 9:45 a.m. | Session 1: Side channel analysis
Make Some Noise. Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis, Shivam Bhasin
CaSA: End-to-end Quantitative Security Analysis of Randomly Mapped Caches, Yuheng Yang |
9:45 a.m. - 11:15 a.m. | Session 2: Frameworks and architectural support for security
Aker: A Design and Verification Framework for Safe and Secure SoC Access Control, Andy Meza
No-FAT: Architectural Support for Low Overhead Memory Safety Checks, Miguel Arroyo
Keystone: An Open Framework for Architecting Trusted Execution Environments, David Kohlbrenner |
11:15 a.m. - 11:30 a.m. | Break |
11:30 a.m. - 12:30 p.m. | Session 3: Speculative execution attacks
An Analysis of Speculative Type Confusion Vulnerabilities in the Wild, Adam Morrison
Microarchitectural Attack Synthesis with Happens-Before Analysis, Caroline Trippel |
12:30 p.m. - 1:30 p.m. | Lunch |
1:30 p.m. - 3:00 p.m. | Session 4: Side channel attacks
FPGA-Based Remote Power Side-Channel Attacks, Mark Zhao
A2: Analog Malicious Hardware, Kaiyuan Yang
Stealthy Tracking of Autonomous Vehicles with Cache Side Channels, Mulong Luo |
3:00 p.m. - 3:15 p.m. | Closing remark/next steps |