10:00 - 10:15 ET |
Welcome Remarks |
Session 1 -- Hardware and Architecture Security |
|
10:15 - 10:30 ET |
SPARSE: Spatially Aware LFI Resilient State Machine Encoding Muhtadi Choudhury, Shahin Tajik and Domenic Forte |
10:30 - 10:45 ET |
InTrust-IoT: Intelligent Ecosystem based on Golden Dataset Free Power Profiling of Trusted Device(s) in IoT for Hardware Trojan Detection Hawzhin Raoof Mohammed, Faiq Khalid, Paul Sawyer, Gabriella Cataloni and Syed Rafay Hasan |
10:45 - 11:00 ET |
Practical and Scalable Security Verification of Secure Architectures Tianwei Zhang, Jakub Szefer and Ruby Lee |
11:00 - 11:15 ET |
Discussion with Authors / Break |
Work-in-Progress Session |
|
11:15 - 11:25 ET |
WiP: VulnerabiliTree: A Taxonomy of Hardware and Software Computer Attacks for Heuristic Hacking Defense Sylvia Llosa, Ange Ishimwe and Tamara Lehman |
11:25 - 11:35 ET |
WiP: Mitigate Reverse Engineering Attacks on Deep Neural Networks with Lightweight Obfuscation Yuezhi Che, Luis Cavanillas and Rujia Wang |
11:35 - 11:45 ET |
WiP: Automatic Transient Execution Attack Detection Zack McKevitt, Tamara Lehman and Ashutosh Trivedi |
11:45 - 12:00 ET |
Discussion with Authors / Break |
Session 2 -- Trusted Execution Environments |
|
12:00 - 12:15 ET |
A Novel Memory Management for RISC-V Enclaves Haonan Li, Weijie Huang, Mingde Ren, Hongyi Lu, Zhenyu Ning, Heming Cui and Fengwei Zhang |
12:15 - 12:30 ET |
Towards Trusted IoT Sensing Systems: Implementing PUF as Secure Key Generator for Root of Trust and Message Authentication Code Kota Yoshida, Kuniyasu Suzaki and Takeshi Fujino |
12:30 - 12:45 ET |
Position Paper: Lessons Learned from Blockchain Applications of Trusted Execution Environments and Implications for Future Research Rabimba Karanjai, Weidong Shi, Lei Xu, Lin Chen, Fengwei Zhang and Zhimin Gao |
12:45 - 13:15 ET |
Invited Presenation: Arm Confidential Compute Architecture - Enhancing Security on Armv9-A Presented by Mark Knight and Gareth Stockwell from Arm Ltd. [ slides ] |
13:15 - 13:30 ET |
Discussion with Authors / Break |
Session 3 -- Quantum Computer Security |
|
13:30 - 13:45 ET |
Short Paper: A Quantum Circuit Obfuscation Methodology for Security and Privacy Aakarshitha Suresh, Abdullah Ash Saki, Mahababul Alam, Rasit Onur Topaloglu and Swaroop Ghosh |
13:45 - 14:00 ET |
Short Paper: Device- and Locality-Specific Fingerprinting of Shared NISQ Quantum Computers Allen Mi, Shuwen Deng and Jakub Szefer |
14:00 ET |
Discussion with Authors / Closing Remarks |