Top Picks in Hardware and Embedded Security

Co-located with the 2021 International Conference On Computer Aided Design (ICCAD 2021)

Home   Selection Process  Organization  FAQs  Top Pick candidates  Program 


Date:
 November 04, 2021: 07:20 am – 01:30 pm

Organizers:

 Gang Qu – University of Maryland, USA
 Johanna Sepulveda – Airbus Defence and Space, GER

Top Picks Workshop creates a venue to showcase the best and high impact recently published works in the area of hardware and embedded security. These works will be selected from conference papers that have appeared in leading hardware security conferences including but not limited to DAC, ICCAD, DATE, ASPDAC, HOST, Asian HOST, GLSVLSI, VLSI Design, CHES, ETS, VTS, ITC, S&P, Usenix Security, CCS, NDSS, ISCA, MICRO, ASPLOS, HPCA, HASP, ACSAC, Euro S&P, and Asia CCS.

Workshop Agenda

TimeEvent
7:20 am – 7:30 amWelcome message from the chair (Gang Qu)
7:30 am – 8:30 amSession 1: Logic Locking

Provably-Secure Logic Locking: From Theory to Practice
Authors: Muhammad Yasin, Abhrajit Sengupta, Mohammed Thari Nabeel, Mohammed Ashraf, Jeyavijayan Rajendran and Ozgur Sinanoglu

Pirates of the Carry-Boolean: Exploring Structural Artifacts of Logic Locking with SAIL
Authors: Prabuddha Chakraborty, Jonathan Cruz, Abdulrahman Alaql and Swarup Bhunia
8:30 am – 9:30 amSession 2: Trust Execution Environment

SANCTUARY: ARMing TrustZone with User-space Enclaves
Authors: Emmanuel Stapf, Ferdinand Brasser, David Gens, Patrick Jauernig and Ahmad-Reza Sadeghi

HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments
Authors: Ghada Dessouky, Tommaso Frassetto and Ahmad-Reza Sadeghi
9:30 am – 10:30 amSession 3: Side-Channel Analysis

The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations
Authors: Stjepan Picek, Annelie Heuser, Alan Jovic, Shivam Bhasin and Francesco Regazzoni

Horizontal Side-Channel Vulnerabilities of Post-Quantum Key Exchange Protocols
Authors: Aydin Aysu, Youssef Tobah, Mohit Tiwari, Andreas Gerstlauer and Michael Orshansky
10:30 am – 10:45 ambreak
10:45 am – 11:45 amSession 4: Identification: from Recycled IC to DNN

Recycled IC Detection Based on Statistical Methods
Authors: Ke Huang, Yu Liu, Nenad Korolija, John Carulli and Yiorgos Makris

DeepAttest: An End-to-End Attestation Framework for Deep Neural Networks
Authors: Huili Chen, Cheng Fu, Bita Darvish Rouhani, Jishen Zhao and Farinaz Koushanfar
11:45 am – 1:15 pmSession 5: Buffer Exploitation and Memory Safety

SpectreRSB: Spectre attacks using the return stack buffer
Authors: Prof. Esmaeil Mohammadian Koruyeh, Khaled Khaswaneh, Chengyue Song and Nael Abu-Ghazaleh

Secure TLBs
Authors: Shuwen Deng, Wenjie Xiong and Jakub Szefer

CHEx86: Context-Sensitive Enforcement of Memory Safety via Microcode-Enabled Capabilities
Authors: Rasool Sharifi and Ashish Venkat
1:15 pm – 1:30 pmclosing remarks (Johanna Sepulveda)
* Speakers are in bold text