8:30am - 8:35am |
Welcome Remarks
|
8:35am - 9:20am |
Keynote Talk: TBD (Mohit Tiwari, UT Austin)
|
|
Session 1: Malware Detection
|
9:20am - 9:40am |
SoK Paper: Power Side-Channel Malware Detection (Alexander Cathis, Ge Li, Shijia Wei, Michael Orshansky, Mohit Tiwari and Andreas Gerstlauer)
|
9:40am - 10:00am |
Towards Effective Machine Learning Models for Ransomware Detection via Low-Level Hardware Information (Chutitep Woralert, Chen Liu and Zander Blasingame)
|
10:00am - 10:30am |
Tea Break
|
10:30am - 11:15am |
Keynote Talk: From Confidential Computing to Zero Trust, Come Along for the (Bumpy?) Ride (Mengmei Ye, IBM)
|
|
Session 2: Secure Machine Learning Systems
|
11:15am - 11:35am |
SoK Paper: Security Concerns in Quantum Machine Learning as a Service (Satwik Kundu and Swaroop Ghosh)
|
11:35am - 11:50am |
WiP: NAPER: Securing Real-Time Resource-Constrained Neural Network with Ensemble-based Protection (Rian Adam Rajagede, Muhammad Husni Santriaji, Muhammad Arya Fikriansyah, Hilal Hudan Nuha, Yanjie Fu and Yan Solihin)
|
11:50am - 12:00pm |
Best Paper Award announcement
|
12:00pm - 1:00pm |
Lunch
|
1:00pm - 1:45pm |
Keynote Talk: Lightening the Shadows: Metadata-Light Exploit Mitigation Based on Novel Cryptography and X86 (Michael LeMay, Intel)
|
|
Session 3: When Cryptography Meets Hardware
|
1:45pm - 2:05pm |
TPU as Cryptographic Accelerator (Rabimba Karanjai, Sangwon Shin, Wujie Xiong, Xinxin Fan, Lin Chen, Tianwei Zhang, Taeweon Suh, Weidong Shi, Veronika Kuchta, Francesco Sica and Lei Xu)
|
2:05pm - 2:20pm |
Short Paper: Analysis of Vivado implementation strategies regarding side-channel leakage for FPGA-based AES implementations
(Ali Asghar, Andreas Becher and Daniel Ziener)
|
2:20pm - 2:40pm |
Cryptographic Memory Tagging: Towards Stateless Integrity (Bharath Namboothiry, David Durham, Christoph Dobraunig and Michael LeMay)
|
2:40pm - 2:55pm |
WiP: Towards a Secure SECP256K1 for Crypto Wallets: Hardware Architecture and Implementation (Joel Poncha Lemayian, Ghyslain Gagnon, Kaiwen Zhang and Pascal Giard)
|
2:55pm - 3:25pm |
Tea Break
|
3:25pm - 4:10pm |
Keynote Talk: The Secure Processor Paradox: When Security Metadata Worsens Microarchitecture Security (Fan Yao, University of Central Florida)
|
|
Session 4: Secure Architecture Designs
|
4:10pm - 4:25pm |
WiP: Secure Memory Scheduling for the Common Case (Jarrett Minton and Rajeev Balasubramonian)
|
4:25pm - 4:40pm |
WiP: Towards Formal Specification of Attestation Frameworks for Confidential Computing (Muhammad Usama Sardar, Thomas Fossati, Hannes Tschofenig and Simon Frost)
|
After 4:40pm |
Mentoring and Networking Session
|