| 8:10 – 8:15 |
Welcome Remarks |
| 8:15 – 9:00 |
Keynote Talk 1: The Haunted Interconnect: The Scary World of Shared Interconnection Networks John Kim (KAIST) |
|
Session 1: Best Paper Candidates |
|
| 9:00 – 9:20 |
CRAFT: Characterizing and Root-Causing Fault Injection Threats at Pre-Silicon Arsalan Ali Malik, Harshvadan Mihir and Aydin Aysu |
| 9:20 – 9:40 |
A Close Look at RMP Entry Caching and Its Security Implications Alexis Bagia, Vincent Ulitzsch, Daniël Trujillo, Mengyuan Li, Mengjia Yan and Jean-Pierre Seifert |
| 9:40 – 10:00 |
MTU: The Multifunction Tree Unit for Accelerating Zero-Knowledge Proofs Jianqiao Mo, Alhad Daftardar, Joey Ah-Kiow, Kaiyue Guo, Benedikt Bünz, Siddharth Garg and Brandon Reagen |
| 10:00 – 10:30 |
Tea break |
| 10:30 – 11:15 |
Keynote Talk 2: Ant’s Journey in Confidential Computing: From Technology Innovation to Real-world Applications Shoumeng Yan (Ant Group) |
|
Session 2: Microarchitecture Design for Security |
|
| 11:15 – 11:35 |
MAGNET: Memory Tagging with Efficient Tag Prediction Pratyush Makkar, Hossam Elatali, Adam Caulfield and N. Asokan |
| 11:35 – 11:50 |
SquareLoop: Explore Optimal Authentication Block Strategy for ML Jan Strzeszynski, Jianming Tong, Kyungmi Lee, Nathan Xiong, Angshuman Parashar, Joel Emer, Tushar Krishna and Mengjia Yan |
| 11:50 – 12:00 |
Best Paper Award announcement |
| 12:00 – 13:00 |
Lunch |
| 13:00 – 13:45 |
Keynote Talk 3: Path to the Siloso Processor: Our Recent Side-Channel Developments, and Thoughts on How to Build a Shared Security Research Platform Trevor E. Carlson (National University of Singapore) |
|
Session 3: System Security Analysis and Defense |
|
| 13:45 – 14:05 |
AccNimbus: Scalable Proofs of Data Possession for Cloud Storage Collin MacDonald, Pankaj Niroula, Aashutosh Poudel and Stephen Herwig |
| 14:05 – 14:25 |
Feasibility of Scalable Performance Counter Malware Detection Framework Using LightGBM Chutitep Woralert, Chen Liu and Zander Blasingame |
| 14:25 – 14:45 |
PathGuard: Path-Aware Syscall Filtering for IoT Embedded Systems Sanggu Lee and Jihong Kim |
| 14:45 – 15:00 |
WiP: Understanding Real-World Impact of Downfall Attack: Analysis of Vector Register Usage in Linux Packages Yohei Harata and Soramichi Akiyama |
| 15:00 – 15:30 |
Tea break |
|
Session 4: Securing the Physical Layer |
|
| 15:30 – 15:50 |
Enabling Gem5 for Side-Channel Power Attack Simulation of Cryptographic Algorithms Christian Appold, Yong Hu, Ernesto Cristopher Villegas Castillo, Hans-Martin Bluethgen and Tim Leinmueller |
| 15:50 – 16:10 |
SRAM-based PUF Implementation and Bias Patterns on AMD Xilinx UltraScale+ Clemens Fritzsch, Wakiya Schulz, Tobias Rosenkranz, Pascal Ahr, Antonio Saavedra, Lars Renkes, Christoph Lipps and Joern Hoffmann |
| 16:10 – 16:30 |
WeightSentry: Real-Time Bit-Flip Protection for Deep Neural Networks on GPUs Mahmoud Abumandour, Srinija Ramischetty, Guru P. Venkataramani and Alaa Alameldeen |
| 16:30 – 16:50 |
Securing HHL Quantum Algorithm against Quantum Computer Attacks Yizhuo Tan, Hrvoje Kukina and Jakub Szefer |
| After 16:50 |
Mentoring and network session |