Top Picks in Hardware and Embedded Security
Co-located with the 2021 International Conference On Computer Aided Design (ICCAD 2021)
Home Selection Process Organization FAQs Top Pick candidates Program
Date:
November 04, 2021: 07:20 am – 01:30 pm
Gang Qu – University of Maryland, USA
Johanna Sepulveda – Airbus Defence and Space, GER
Top Picks Workshop creates a venue to showcase the best and high impact recently published works in the area of hardware and embedded security. These works will be selected from conference papers that have appeared in leading hardware security conferences including but not limited to DAC, ICCAD, DATE, ASPDAC, HOST, Asian HOST, GLSVLSI, VLSI Design, CHES, ETS, VTS, ITC, S&P, Usenix Security, CCS, NDSS, ISCA, MICRO, ASPLOS, HPCA, HASP, ACSAC, Euro S&P, and Asia CCS.
Workshop Agenda
Time | Event |
---|---|
7:20 am – 7:30 am | Welcome message from the chair (Gang Qu) |
7:30 am – 8:30 am | Session 1: Logic Locking Provably-Secure Logic Locking: From Theory to Practice Authors: Muhammad Yasin, Abhrajit Sengupta, Mohammed Thari Nabeel, Mohammed Ashraf, Jeyavijayan Rajendran and Ozgur Sinanoglu Pirates of the Carry-Boolean: Exploring Structural Artifacts of Logic Locking with SAIL Authors: Prabuddha Chakraborty, Jonathan Cruz, Abdulrahman Alaql and Swarup Bhunia |
8:30 am – 9:30 am | Session 2: Trust Execution Environment SANCTUARY: ARMing TrustZone with User-space Enclaves Authors: Emmanuel Stapf, Ferdinand Brasser, David Gens, Patrick Jauernig and Ahmad-Reza Sadeghi HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments Authors: Ghada Dessouky, Tommaso Frassetto and Ahmad-Reza Sadeghi |
9:30 am – 10:30 am | Session 3: Side-Channel Analysis The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations Authors: Stjepan Picek, Annelie Heuser, Alan Jovic, Shivam Bhasin and Francesco Regazzoni Horizontal Side-Channel Vulnerabilities of Post-Quantum Key Exchange Protocols Authors: Aydin Aysu, Youssef Tobah, Mohit Tiwari, Andreas Gerstlauer and Michael Orshansky |
10:30 am – 10:45 am | break |
10:45 am – 11:45 am | Session 4: Identification: from Recycled IC to DNN Recycled IC Detection Based on Statistical Methods Authors: Ke Huang, Yu Liu, Nenad Korolija, John Carulli and Yiorgos Makris DeepAttest: An End-to-End Attestation Framework for Deep Neural Networks Authors: Huili Chen, Cheng Fu, Bita Darvish Rouhani, Jishen Zhao and Farinaz Koushanfar |
11:45 am – 1:15 pm | Session 5: Buffer Exploitation and Memory Safety SpectreRSB: Spectre attacks using the return stack buffer Authors: Prof. Esmaeil Mohammadian Koruyeh, Khaled Khaswaneh, Chengyue Song and Nael Abu-Ghazaleh Secure TLBs Authors: Shuwen Deng, Wenjie Xiong and Jakub Szefer CHEx86: Context-Sensitive Enforcement of Memory Safety via Microcode-Enabled Capabilities Authors: Rasool Sharifi and Ashish Venkat |
1:15 pm – 1:30 pm | closing remarks (Johanna Sepulveda) |