8:30am - 8:35am |
Welcome Remarks -- Wenjie Xiong (Virginia Tech) and Tianwei Zhang (NTU) |
8:35am - 9:20am |
Keynote Talk: Reinforcement Learning for Microarchitectural Security: Cache Timing Channel, Speculative Execution, and Defense (Mulong Luo, UT Austin) [ slides ] |
Session 1: Malware Detection -- Session Chair: Wenjie Xiong (Virginia Tech) |
|
9:20am - 9:40am |
SoK Paper: Power Side-Channel Malware Detection (Alexander Cathis, Ge Li, Shijia Wei, Michael Orshansky, Mohit Tiwari and Andreas Gerstlauer) [ Best Paper Award ] [ slides ] |
9:40am - 10:00am |
Towards Effective Machine Learning Models for Ransomware Detection via Low-Level Hardware Information (Chutitep Woralert, Chen Liu and Zander Blasingame) [ slides ] |
10:00am - 10:30am |
Tea Break |
10:30am - 11:15am |
Keynote Talk: From Confidential Computing to Zero Trust, Come Along for the (Bumpy?) Ride (Mengmei Ye, IBM) [ slides ] |
Session 2: Secure Machine Learning Systems -- Session Chair: Meng Li (Peking University) |
|
11:15am - 11:35am |
SoK Paper: Security Concerns in Quantum Machine Learning as a Service (Satwik Kundu and Swaroop Ghosh) [ slides ] |
11:35am - 11:50am |
WiP: NAPER: Securing Real-Time Resource-Constrained Neural Network with Ensemble-based Protection (Rian Adam Rajagede, Muhammad Husni Santriaji, Muhammad Arya Fikriansyah, Hilal Hudan Nuha, Yanjie Fu and Yan Solihin) |
11:50am - 12:00pm |
Best Paper Award announcement |
12:00pm - 1:00pm |
Lunch |
1:00pm - 1:45pm |
Keynote Talk: Lightening the Shadows: Metadata-Light Exploit Mitigation Based on Novel Cryptography and X86 (Michael LeMay, Intel) |
Session 3: When Cryptography Meets Hardware -- Session Chair: Mulong Luo (UT Austin) |
|
1:45pm - 2:05pm |
TPU as Cryptographic Accelerator (Rabimba Karanjai, Sangwon Shin, Wujie Xiong, Xinxin Fan, Lin Chen, Tianwei Zhang, Taeweon Suh, Weidong Shi, Veronika Kuchta, Francesco Sica and Lei Xu) [ slides ] |
2:05pm - 2:20pm |
Short Paper: Analysis of Vivado implementation strategies regarding side-channel leakage for FPGA-based AES implementations
(Ali Asghar, Andreas Becher and Daniel Ziener) [ slides ] |
2:20pm - 2:40pm |
Cryptographic Memory Tagging: Towards Stateless Integrity (Bharath Namboothiry, David Durham, Christoph Dobraunig and Michael LeMay) [ slides ] |
2:40pm - 2:55pm |
WiP: Towards a Secure SECP256K1 for Crypto Wallets: Hardware Architecture and Implementation (Joel Poncha Lemayian, Ghyslain Gagnon, Kaiwen Zhang and Pascal Giard) [ slides ] |
2:55pm - 3:30pm |
Tea Break |
3:30pm - 4:15pm |
Keynote Talk: The Secure Processor Paradox: When Security Metadata Worsens Microarchitecture Security (Fan Yao, University of Central Florida) [ slides ] |
Session 4: Secure Architecture Designs -- Session Chair: Fan Yao (UCF) |
|
4:15pm - 4:30pm |
WiP: Secure Memory Scheduling for the Common Case (Jarrett Minton and Rajeev Balasubramonian) |
4:30pm - 4:45pm |
WiP: Towards Formal Specification of Attestation Frameworks for Confidential Computing (Muhammad Usama Sardar, Thomas Fossati, Hannes Tschofenig and Simon Frost) [ slides ] |
After 4:45pm |
Mentoring and Networking Session |