█ Regular Sessions | █ Special Sessions | █ Keynote & Visionary Talks |
█ Plenary Events | █ Social Events | █ Tutorials & Exhibits |
Tuesday, May 6th | |||
07:00 - 17:00 |
Registration
Location: Gateway Foyer |
||
07:00 - 08:10 | Coffee & Connections Location: Gateway Foyer | ||
08:00 - 18:00 | Exhibitions Location: Gateway Foyer | ||
08:10 - 08:30 | Opening Remarks Location: Cedar + Pine | ||
08:30 - 09:10 |
Keynote 1: EU Cyber Resiliency Act (CRA) 2025: Implementation & Challenges
Location: Cedar + Pine Moderator: Naghmeh Karimi, University of Maryland, Baltimore County Speaker: Jon Azen, Qualcomm |
||
09:10 - 09:40 |
Visionary 1: Product Security in the AI Era: Challenges and Opportunities
Location: Cedar + Pine Moderator: Jim Plusquellic, University of New Mexico Speaker: Vivek Vedula, ARM |
||
09:40 - 10:10 | Coffee Break Location: Gateway Foyer | ||
10:10 - 11:10 |
Regular Session 1
Session Chair: Prabhat Mishra, University of Florida Location: Cedar + Pine 1.1: An Input Recovery Side-Channel Attack on DNN Accelerator with 3D Power Surface Le Wu, Liji Wu, Zhiwei Ba, and Xiangmin Zhang 1.2: MACPruning: Dynamic Operation Pruning to Mitigate Side-Channel DNN Model Extraction Ruyi Ding, Cheng Gongye, Davis Ranney, A. Adam Ding, and Yunsi Fei 1.3: EyeHearYou: Probing Location Identification via Occluded Smartphone Cameras and Ultrasound Nina Shamsi, Yan Long, and Kevin Fu |
Regular Session 2
Session Chair: Sohrab Aftabjahani, Intel Location: San Juan + San Carlos 2.1: Betrayed by Light: How Photon Emission Microscopy Empowers Register Bit-level Laser Attacks on Microcontrollers Hugo Perrin, Jean-Max Dutertre, and Jean-Baptiste Rigaud *2.2: ReFID: A System-Aware Remote Fault-Injection Attack Detection & Mitigation For Secure Heterogeneous System Amit Mazumder Shuvo, Md Latifur Rahman, Jingbo Zhou, Farimah Farahmandi, and Mark Tehranipoor 2.3: ML-EMFI: A Machine Learning-Driven Pre-Silicon Electromagnetic Fault Injection Security Evaluation for Robust IC Design Pantha Protim Sarker, Tianze Kan, Jingchen Liang, Ozgur Tuncer, Bo He, Zelin Lu, Sudarshan Mallu, Lang Lin, Norman Chang, Rikuu Hasegawa, Kazuki Monta, Makoto Nagata, Farimah Farahmandi, and Mark Tehranipoor |
|
11:10 - 12:10 |
Regular Session 3
Session Chair: Hadi Kamali, Univeristy of Central Florida Location: Cedar + Pine 3.1: E-LoQ: Enhanced Locking for Quantum Circuit IP Protection Yuntao Liu, Jayden John, and Qian Wang *3.2: STIQ: Safeguarding Training and Inferencing of Quantum Neural Networks from Untrusted Cloud Satwik Kundu and Swaroop Ghosh 3.3: Undermining Quantum Circuit Obfuscation: Insights from Structural Analysis Donald Lushi and Samah Saeed |
Regular Session 4
Session Chair: Lang Lin, Ansys Location: San Juan + San Carlos 4.1: 3D Bioprinter Firmware Attacks: Categorization, Implementation, and Impacts Muhammad Ahsan, Barry Najarro-Blancas, Johanna Tsala Ebode, Nastassja Lewinski, and Irfan Ahmed 4.2: Reverse Engineering DVFS Mechanisms Ryan Piersma, Tawhid Bhuiyan, Tanvir Ahmed Khan, and Simha Sethumadhavan *4.3: FanBleed: Stealing Your Secrets via Observing Your Cooling Fan Sisheng Liang, Zhengxiong Li, Zihao Zhan, and Zhenkai Zhang |
|
12:10 - 13:20 | Lunch Location: Fir + Oak | ||
13:20 - 14:40 |
Panel 1: LLMs and Cyber/Hardware Security
Location: Cedar + Pine Moderator: Vincent J. Mooney, Georgia Tech Panelists: Antonio de la Serna, Principal Director, Siemens EDA Priyam Biswas, Security Research Scientist, Intel Farimah Farahmandi, Professor, University of Florida Jeremy Bellay, Safe and Reliable AI Agents Director, Battelle Farinaz Koushanfar, Professor, University of California San Diego |
||
14:40 - 15:40 |
Industry Track 1
Location: Cedar + Pine IT1.1: (14:40 - 15:10) Synopsys Title: Nothing is more Secure than Hardware Security Speaker: Pim Tuyls, Executive Director, Security IP R&D, Synopsys IT1.2: (15:10 - 15:40) Caspia Title: From Code to Confidence: Bringing Security Automation to the Frontline of Chip Design Speaker: Beau Bakken, VP of Products, Caspia Technologies |
||
15:40 - 17:00 | Break & Hardware Demo Location: Sierra | ||
17:00 - 18:00 |
Regular Session 5
Session Chair: Adam Kimura, Battelle Location: Cedar + Pine 5.1: USBSnoop - Revealing Device Activities via USB Congestions Davis Ranney, Yufei Wang, Yunsi Fei, and Adam Ding 5.2: Traffic Analysis Attacks on Wireless NoC-based SoCs Hansika Weerasena and Prabhat Mishra 5.3: DOME: Automated Validation of Data-Oblivious Program Execution Donayam Benti and Todd Austin |
Regular Session 6
Session Chair: Christopher Clark, Georgia Tech Research Institute Location: San Juan + San Carlos *6.1: WaveSleuth: Retrospective PLC Memory for Anomaly Detection in Industrial Control Systems Nehal Ameen, Ramyapandian Vijayakanthan, Adeen Ayub, Aisha Ali-Gombe, and Irfan Ahmed 6.2: EvoWeight: Sponge Poisoning of FPGA-based DNN Accelerators in Differential Private Secure Federated Learning Muhammad Shakeel Akram, Vincent Meyers, Mehdi Tahoori, Bogaraju Sharatchandra Varma, and Dewar Finlay 6.3: LAPD: Lifecycle-Aware Power-Based Malware Detection Alexander Cathis, Mulong Luo, Mohit Tiwari, and Andreas Gerstlauer |
Wednesday, May 7th | |||
07:00 - 17:00 |
Registration
Location: Gateway Foyer |
||
07:00 - 08:10 | Coffee & Connections Location: Gateway Foyer | ||
08:00 - 18:30 | Exhibitions Location: Gateway Foyer | ||
08:05 - 08:10 | Opening Remarks Location: Cedar + Pine | ||
08:10 - 08:50 |
Keynote 2: Silicon Sentinels: How Breakthrough Innovations are Reinventing Trust in Hardware
Location: Cedar + Pine Moderator: Ujjwal Guin, Auburn University Speaker: Dhinesh Manoharan, Intel |
||
08:50 - 11:40 |
Ph.D. Dissertation Competition
Location: Silicon Valley
|
||
08:50 - 09:50 |
Regular Session 7
Session Chair: Irfan Ahmed, Virginia Commonwealth University Location: Cedar + Pine 7.1: Michscan: Black-Box Neural Network Integrity Checking at Runtime Through Power Analysis Robi Paul and Michael Zuzak 7.2: AccessShadow: Leveraging Adversarial Samples to Counter Deep Learning-Assisted Cache Timing Attacks Xiang Zhang, Ziyue Zhang, A. Adam Ding, and Yunsi Fei 7.3: Input-Triggered Hardware Trojan Attack on Spiking Neural Networks Spyridon Raptis, Paul Kling, Ioannis Kaskampas, Ihsen Alouani and Haralampos-G. Stratigopoulos |
Regular Session 8
Session Chair: Ioannis Savidis, Drexel University Location: Cascade 8.1: Trojan Localization in Generic AMS Circuits from Combined Power and Functional Queries Dipali Jain, Shakil Ahmed, Guangwei Zhao, Rajesh Datta, and Kaveh Shamsi 8.2: Evaluating the Effectiveness of Hardware Trojan Detection Approaches at RTL Ruochen Dai, Zhaoxiang Liu, Orlando Arias, Xiaolong Guo, and Tuba Yavuz 8.3: Amplifying Electromagnetic Leakage by Hardware Trojans Through Cable Geometry Manipulation Hayato Ide, Shohei Matsumoto, Taiki Kitazawa, Shugo Kaji, Daisuke Fujimoto, Takashi Kasuga, and Yuichi Hayashi |
|
09:50 - 10:20 | Coffee Break Location: Gateway Foyer | ||
10:20 - 11:40 | Hardware Hacking Session Location: Cedar + Pine | ||
11:40 - 12:40 |
Industry Track 2
Location: Cedar + Pine IT2.1: (11:40 - 12:10) Menta Title: How to Achieve Crypto Agility for SoCs and ASICs with Adaptable Hardware Speaker: Jayson Bethurem, VP, Business Development, Menta eFPGA Inc. IT2.2: (12:10 - 12:40) Cadence Title: Design and Test of Secure Embedded Systems Speaker: Sylvain Guilley, Cadence |
||
12:40 - 13:50 | Lunch Location: Fir + Oak | ||
13:50 - 14:20 |
Visionary 2: A Look Into 2035: Sensing, Intelligence, Security, and Autonomous Systems
Location: Cedar + Pine Moderator: Farimah Farahmandi, Univeristy of Florida Speaker: Doug Gardner, Analog Devices |
||
14:20 - 15:40 |
Panel 2: The Open Grand Challenges of Hardware Security
Location: Cedar + Pine Moderator: Adam Kimura, Battelle Panelists: Rachana Maitra, Senior Principal Eng. and Security Product Manager, Marvell Sylvain Guilley, CTO and Co-founder, Secure-IC Ro Cammorta, Chief Scientist of Privacy-Enhanced Computing Research, Intel Len Orlando, Senior Business Development Executive, Ansys Jim Plusquellic, Professor, HOST Hall of Famer, University of New Mexico |
||
15:40 - 17:00 | Break & Hardware Demo Location: Sierra | ||
17:00 - 18:00 |
Regular Session 9
Session Chair: Fareena Saqib, The University of North Carolina at Charlotte Location: Cedar + Pine 9.1: Sourcing Trust From Peers with Physical Unclonable Functions Md Sadman Siraj, Aisha B Rahman, Cyrus Minwalla, Eirini Eleni Tsiropoulou, and Jim Plusquellic 9.2: On the Impact of Metastability in Jitter-Based TRNG Florian Pebay-Peyroula, Licinius-Pompiliu Benea, Mikael Carmona, and Romain Wacquez 9.3: Quantization Schemes for PUFs: The Entropy-Area Trade-Off Jens Nöpel, Tim Music, Niklas Stein, Christoph Frisch, and Michael Pehl |
Regular Session 10
Session Chair: Matthew Areno, Rickert Areno Engineering Location: Cascade 10.1: cuOT: Accelerating Oblivious Transfer on GPUs for Privacy-Preserving Computation Andrew Gan, Setsuna Yuki, Timothy Rogers, and Zahra Ghodsi 10.2: Cryptographic Least Privilege Enforcement for Scalable Memory Isolation Martin Unterguggenberger, David Schrammel, Lukas Maar, Lukas Lamster, Vedad Hadžić, and Stefan Mangard 10.3: CHESS: Compiling Homomorphic Encryption with Scheme Switching Rostin Shokri and Nektarios Georgios Tsoutsos |
|
18:00 - 20:00 | Banquet and Award Ceremony Location: Fir + Oak |
Thursday, May 8th | |||
07:00 - 11:00 |
Registration
Location: Gateway Foyer |
||
07:00 - 08:10 | Coffee & Connections Location: Gateway Foyer | ||
08:05 - 08:10 | Opening Remarks Location: Cedar + Pine | ||
08:10 - 08:50 |
Keynote 3: Scaling Open-Source Silicon for Everyone
Location: Cedar + Pine Moderator: Waleed Khalil, The Ohio State Univeristy Speaker: Dominic Rizzo, zeroRISC |
||
08:50 - 09:50 |
Regular Session 11
Session Chair: Matt Areno, Rickert-Areno Engineering Location: Cedar + Pine 11.1: SoCureLLM: An LLM-driven Approach for Large-Scale System-on-Chip Security Verification and Policy Generation Shams Tarek, Dipayan Saha, Sujan Kumar Saha, Mark Tehranipoor, and Farimah Farahmandi 11.2: Low-entropy Packed Binary Detection via Accurate Hardware Events Profiling Erika Leal, Mengfei Ren, Shijia Li, and Jiang Ming 11.3: RLFuzz: Accelerating Hardware Fuzzing with Deep Reinforcement Learning Raphael Götz, Christoph Sendner, Nico Ruck, Mohamadreza Rostami, Alexandra Dmitrienko, and Ahmad-Reza Sadeghi |
Regular Session 12
Session Chair: Xiaolong Guo, Kansas State University Location: Cascade 12.1: Reward-based Blockchain Infrastructure for 3D IC Supply Chain Provenance Sulyab Thottungal Valapu, Aritri Saha, Bhaskar Krishnamachari, Vivek Menon, and Ujjwal Guin 12.2: RRR : Rethinking Randomized Remapping for High Performance Secured NVM LLC Prathamesh Nitin Tanksale, Guru Raghav S. Seethiraju, Shirshendu Das, and Venkata Kalyan Tavva 12.3: Efficient CPA Attack on Hardware Implementation of ML-DSA in Post-Quantum Root of Trust Merve Karabulut and Reza Azarderakhsh |
|
09:50 - 10:20 | Break Location: Gateway Foyer | ||
10:20 - 10:50 |
Visionary 3: Smarter Silicon Security: Generative AI in SoC Verification
Location: Cedar + Pine Moderator: Ioannis Savidis, Drexel Univeristy Speaker: Avinash Ayalasomayajula, Caspia Technologies |
||
10:50 - 11:50 |
Panel 3: Security Feud
Location: Cedar + Pine Moderators: Adam Kimura, Ioannis Savidis, and Jim Plusquellic |
||
11:50 - 13:10 | Lunch Location: Fir + Oak | ||
13:10 - 14:10 |
Regular Session 13
Session Chair: Vincent J. Mooney, Georgia Tech Location: Cedar + Pine 13.1: Code Encryption for Confidentiality and Execution Integrity down to Control Signals Théophile Gousselot, Jean-Max Dutertre, Olivier Potin, and Jean-Baptiste Rigaud 13.2: Termite Attacks: Gnawing on Logs to Extract Secret Information Hyun Bin Lee, Tushar Jois, Chris Fletcher, and Carl Gunter 13.3: Securing Smart Manufacturing: Detection of Cyber-Physical Attacks in CNC-based Systems Bethanie Williams, Rima Awad, Clifton Mulkey, Gabriela Ciocarlie, Muhammad Ismail, and Kyle Saleeby |
Regular Session 14
Session Chair: Jeyavijayan Rajendran, Univeristy of Texas A&M Location: Cascade 14.1: WattShield: A Power Side-Channel Framework for Detecting Malicious Firmware in Fused Filament Fabrication Muhammad Ahsan and Irfan Ahmed 14.2: Breaking Confidentiality of XTS-AES Encrypted Data at Rest on Microprocessors using Electromagnetic Side-Channel Attacks Paul Krüger, Stefan Wildermann, and Jürgen Teich 14.3: MicroPower: Micro Neural Networks for Side-Channel Attacks Logan Reichling, Ryan Evans, Mabon Ninan, Phuc Mai, Boyang Wang, Yunsi Fei, and John Emmert |
|
14:10 - 14:30 | Concluding Remarks - Program and General Chairs 2025/2026 Location: Cedar + Pine |