TP Program 2022 – IEEE HSTTC (original) (raw)

Skip to content (Press Enter)


Top Picks in Hardware and Embedded Security

Co-located with the 2022 International Conference On Computer Aided Design (ICCAD 2022)

Home Selection Organization FAQs Candidates Program


Workshop Agenda

Time Event
8:30 a.m. - 8:45 a.m. Opening/welcome
8:45 a.m. - 9:45 a.m. Session 1: Side channel analysis Make Some Noise. Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis, Shivam Bhasin CaSA: End-to-end Quantitative Security Analysis of Randomly Mapped Caches, Yuheng Yang
9:45 a.m. - 11:15 a.m. Session 2: Frameworks and architectural support for security Aker: A Design and Verification Framework for Safe and Secure SoC Access Control, Andy Meza No-FAT: Architectural Support for Low Overhead Memory Safety Checks, Miguel Arroyo Keystone: An Open Framework for Architecting Trusted Execution Environments, David Kohlbrenner
11:15 a.m. - 11:30 a.m. Break
11:30 a.m. - 12:30 p.m. Session 3: Speculative execution attacks An Analysis of Speculative Type Confusion Vulnerabilities in the Wild, Adam Morrison Microarchitectural Attack Synthesis with Happens-Before Analysis, Caroline Trippel
12:30 p.m. - 1:30 p.m. Lunch
1:30 p.m. - 3:00 p.m. Session 4: Side channel attacks FPGA-Based Remote Power Side-Channel Attacks, Mark Zhao A2: Analog Malicious Hardware, Kaiyuan Yang Stealthy Tracking of Autonomous Vehicles with Cache Side Channels, Mulong Luo
3:00 p.m. - 3:15 p.m. Closing remark/next steps