8:00 - 8:10
Opening/Welcome
Session 1: Accelerated Cryptographic Hardware and Arithmetic
8:10 - 8:30
AMAZE: Accelerated MiMC Hardware Architecture for Zero-Knowledge Applications on the Edge
Nojan Sheybani
8:30 - 8:50
An Extensive Study of Flexible Design Methods for the Number Theoretic Transform
Aydin Aysu
8:50 - 9:10
High-Speed Implementation of ECC Scalar Multiplication in GF(p) for Generic Montgomery Curves
Debapriya Basu Roy
9:10 - 9:30
EmMark: Robust Watermarks for IP Protection of Embedded Quantized Large Language Models
Nojan Sheybani
9:30 - 10:00
Coffee Break
Session 2: Side-Channel Analysis and Protection
10:00 - 10:20
Mind the Portability: A Warrior's Guide through Realistic Profiled Side-channel Analysis
Shivam Bhasin
10:20 - 10:40
VALIANT: An EDA Tool Flow for Side-Channel Leakage Evaluation and Tailored Protection
Debdeep Mukhopadhyay
10:40 - 11:00
Strength in numbers: Improving generalization with ensembles in machine learning-based profiled side-channel analysis
Lukasz Chmielewski
11:00 - 11:20
RTL2MμPATH: Multi-μPATH Synthesis with Applications to Hardware Security Verification
Yao Hsiao
11:20 - 11:40
Maya: Using Formal Control to Obfuscate Power Side Channels
Deming Chen
11:40 - 12:50
Lunch Break
Session 3: Emerging Threats and Mitigations in Computing Systems
12:50 - 13:10
Defending Cryptographic Code from Spectres on Existing Hardware with Software-Compiler-Hardware Codesign
Nicholas Mosier
13:10 - 13:30
Revisiting RowHammer: An Experimental Analysis of Modern DRAM Devices and Mitigation Techniques
Onur Mutlu
13:30 - 13:50
The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks
Chenglu Jin
13:50 - 14:10
RowPress: Amplifying Read Disturbance in Modern DRAM Chips
Onur Mutlu
14:10 - 14:30
SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation
Khaled Khasawneh
14:30 - 15:00
Coffee Break
Session 4: Hardware and FPGA Security
15:00 - 15:20
LoopBreaker: Disabling Interconnects to Mitigate Voltage-Based Attacks in Multi-Tenant FPGAs
Hassan Nassar
15:20 - 15:40
Pentimento: Data Remanence in Cloud FPGAs
Andy Meza
15:40 - 16:00
Silicon Validation of LUT-based Logic-Locked IP Cores
Raghul Saravanan
16:00 - 16:20
Security Verification of the OpenTitan Hardware Root of Trust
Andy Meza
16:20 - 16:30
Closing Remark/Next Steps