HOST 2025 | IEEE International Symposium on Hardware Oriented Security and Trust

HOST 2025 PROGRAM, May 5 - 8, 2025 (All times are PST)

█ Regular Sessions █ Special Sessions █ Keynote & Visionary Talks
█ Plenary Events █ Social Events █ Tutorials & Exhibits
*Best Paper Nominee
Monday, May 5th
08:00 - 17:00 Registration
Location: Gateway Foyer
10:00 - 12:00 T1. CPA Attack on Hardware Implementation of ML-DSA in Post-Quantum Root of Trust
Merve Karabulut - Florida Atlantic University
Reza Azarderakhsh - Florida Atlantic University
Location: Cedar + Pine
12:00 - 12:30 Break
Location: Gateway Foyer
12:30 - 14:30 T2. Introduction to IEEE 3164 Standard for Security Annotation for Electronic Design Integration (SAE-DI) based on Accellera SAE-DI and a New Approach to Identifying Security Assets Within an IP
Location: San Juan + San Carlos
Sohrab Aftabjahani - Intel

T3. LLM for SoC Security
Location: Cedar + Pine
Mark Tehranipoor - University of Florida
Farimah Farahmandi - University of Florida
14:30 - 15:00 Break
Location: Gateway Foyer
15:00 - 17:00 T4. A Side-channel Analysis Primer for the Chip Designer
Location: San Juan + San Carlos
Nicole Fern - Keysight

T5. Tutorial: Security in Quantum Computing Era
Location: Cedar + Pine
Jakub Szefer - Northwestern University
Tuesday, May 6th
07:00 - 17:00 Registration
Location: Gateway Foyer
07:00 - 08:10Coffee & Connections
Location: Gateway Foyer
08:00 - 18:00Exhibitions
Location: Gateway Foyer
08:10 - 08:30Opening Remarks
Location: Cedar + Pine
08:30 - 09:10 Keynote 1: EU Cyber Resiliency Act (CRA) 2025: Implementation & Challenges
Location: Cedar + Pine
Moderator: Naghmeh Karimi, University of Maryland, Baltimore County
Speaker: Jon Azen, Qualcomm
09:10 - 09:40 Visionary 1: Product Security in the AI Era: Challenges and Opportunities
Location: Cedar + Pine
Moderator: Jim Plusquellic, University of New Mexico
Speaker: Vivek Vedula, ARM
09:40 - 10:10Coffee Break
Location: Gateway Foyer
10:10 - 11:10 Regular Session 1
Session Chair: Prabhat Mishra, University of Florida
Location: Cedar + Pine
1.1: An Input Recovery Side-Channel Attack on DNN Accelerator with 3D Power Surface
Le Wu, Liji Wu, Zhiwei Ba, and Xiangmin Zhang
1.2: MACPruning: Dynamic Operation Pruning to Mitigate Side-Channel DNN Model Extraction
Ruyi Ding, Cheng Gongye, Davis Ranney, A. Adam Ding, and Yunsi Fei
1.3: EyeHearYou: Probing Location Identification via Occluded Smartphone Cameras and Ultrasound
Nina Shamsi, Yan Long, and Kevin Fu
Regular Session 2
Session Chair: Sohrab Aftabjahani, Intel
Location: San Juan + San Carlos
2.1: Betrayed by Light: How Photon Emission Microscopy Empowers Register Bit-level Laser Attacks on Microcontrollers
Hugo Perrin, Jean-Max Dutertre, and Jean-Baptiste Rigaud
*2.2: ReFID: A System-Aware Remote Fault-Injection Attack Detection & Mitigation For Secure Heterogeneous System
Amit Mazumder Shuvo, Md Latifur Rahman, Jingbo Zhou, Farimah Farahmandi, and Mark Tehranipoor
2.3: ML-EMFI: A Machine Learning-Driven Pre-Silicon Electromagnetic Fault Injection Security Evaluation for Robust IC Design
Pantha Protim Sarker, Tianze Kan, Jingchen Liang, Ozgur Tuncer, Bo He, Zelin Lu, Sudarshan Mallu, Lang Lin, Norman Chang, Rikuu Hasegawa, Kazuki Monta, Makoto Nagata, Farimah Farahmandi, and Mark Tehranipoor
11:10 - 12:10 Regular Session 3
Session Chair: Hadi Kamali, Univeristy of Central Florida
Location: Cedar + Pine
3.1: E-LoQ: Enhanced Locking for Quantum Circuit IP Protection
Yuntao Liu, Jayden John, and Qian Wang
*3.2: STIQ: Safeguarding Training and Inferencing of Quantum Neural Networks from Untrusted Cloud
Satwik Kundu and Swaroop Ghosh
3.3: Undermining Quantum Circuit Obfuscation: Insights from Structural Analysis
Donald Lushi and Samah Saeed
Regular Session 4
Session Chair: Lang Lin, Ansys
Location: San Juan + San Carlos
4.1: 3D Bioprinter Firmware Attacks: Categorization, Implementation, and Impacts
Muhammad Ahsan, Barry Najarro-Blancas, Johanna Tsala Ebode, Nastassja Lewinski, and Irfan Ahmed
4.2: Reverse Engineering DVFS Mechanisms
Ryan Piersma, Tawhid Bhuiyan, Tanvir Ahmed Khan, and Simha Sethumadhavan
*4.3: FanBleed: Stealing Your Secrets via Observing Your Cooling Fan
Sisheng Liang, Zhengxiong Li, Zihao Zhan, and Zhenkai Zhang
12:10 - 13:20Lunch
Location: Fir + Oak
13:20 - 14:40 Panel 1: LLMs and Cyber/Hardware Security
Location: Cedar + Pine
Moderator: Vincent J. Mooney, Georgia Tech

Panelists:
Antonio de la Serna, Principal Director, Siemens EDA
Priyam Biswas, Security Research Scientist, Intel
Farimah Farahmandi, Professor, University of Florida
Jeremy Bellay, Safe and Reliable AI Agents Director, Battelle
Farinaz Koushanfar, Professor, University of California San Diego
14:40 - 15:40 Industry Track 1
Location: Cedar + Pine
IT1.1: (14:40 - 15:10) Synopsys
Title: Nothing is more Secure than Hardware Security
Speaker: Pim Tuyls, Executive Director, Security IP R&D, Synopsys
IT1.2: (15:10 - 15:40) Caspia
Title: From Code to Confidence: Bringing Security Automation to the Frontline of Chip Design
Speaker: Beau Bakken, VP of Products, Caspia Technologies
15:40 - 17:00Break & Hardware Demo
Location: Sierra
17:00 - 18:00 Regular Session 5
Session Chair: Adam Kimura, Battelle
Location: Cedar + Pine
5.1: USBSnoop - Revealing Device Activities via USB Congestions
Davis Ranney, Yufei Wang, Yunsi Fei, and Adam Ding
5.2: Traffic Analysis Attacks on Wireless NoC-based SoCs
Hansika Weerasena and Prabhat Mishra
5.3: DOME: Automated Validation of Data-Oblivious Program Execution
Donayam Benti and Todd Austin
Regular Session 6
Session Chair: Christopher Clark, Georgia Tech Research Institute
Location: San Juan + San Carlos
*6.1: WaveSleuth: Retrospective PLC Memory for Anomaly Detection in Industrial Control Systems
Nehal Ameen, Ramyapandian Vijayakanthan, Adeen Ayub, Aisha Ali-Gombe, and Irfan Ahmed
6.2: EvoWeight: Sponge Poisoning of FPGA-based DNN Accelerators in Differential Private Secure Federated Learning
Muhammad Shakeel Akram, Vincent Meyers, Mehdi Tahoori, Bogaraju Sharatchandra Varma, and Dewar Finlay
6.3: LAPD: Lifecycle-Aware Power-Based Malware Detection
Alexander Cathis, Mulong Luo, Mohit Tiwari, and Andreas Gerstlauer
Wednesday, May 7th
07:00 - 17:00 Registration
Location: Gateway Foyer
07:00 - 08:10Coffee & Connections
Location: Gateway Foyer
08:00 - 18:30Exhibitions
Location: Gateway Foyer
08:05 - 08:10Opening Remarks
Location: Cedar + Pine
08:10 - 08:50 Keynote 2: Silicon Sentinels: How Breakthrough Innovations are Reinventing Trust in Hardware
Location: Cedar + Pine
Moderator: Ujjwal Guin, Auburn University
Speaker: Dhinesh Manoharan, Intel
08:50 - 11:40 Ph.D. Dissertation Competition
Location: Silicon Valley
  1. Metasurface-in-the-Middle Attacks
  2. Security and Privacy of Quantum Computers
  3. Hardware Security against Physical Threats for Integrated Circuits
  4. Cache Side Channel Attacks on Modern Processors
  5. Hardware-Firmware Security Co-Validation
  6. Leak to Attack, Leak to Protect: Side Channels in Heterogeneous Systems
  7. Stealthy Control Logic Attacks and Defense in Industrial Control Systems
08:50 - 09:50 Regular Session 7
Session Chair: Irfan Ahmed, Virginia Commonwealth University
Location: Cedar + Pine
7.1: Michscan: Black-Box Neural Network Integrity Checking at Runtime Through Power Analysis
Robi Paul and Michael Zuzak
7.2: AccessShadow: Leveraging Adversarial Samples to Counter Deep Learning-Assisted Cache Timing Attacks
Xiang Zhang, Ziyue Zhang, A. Adam Ding, and Yunsi Fei
7.3: Input-Triggered Hardware Trojan Attack on Spiking Neural Networks
Spyridon Raptis, Paul Kling, Ioannis Kaskampas, Ihsen Alouani and Haralampos-G. Stratigopoulos
Regular Session 8
Session Chair: Ioannis Savidis, Drexel University
Location: Cascade
8.1: Trojan Localization in Generic AMS Circuits from Combined Power and Functional Queries
Dipali Jain, Shakil Ahmed, Guangwei Zhao, Rajesh Datta, and Kaveh Shamsi
8.2: Evaluating the Effectiveness of Hardware Trojan Detection Approaches at RTL
Ruochen Dai, Zhaoxiang Liu, Orlando Arias, Xiaolong Guo, and Tuba Yavuz
8.3: Amplifying Electromagnetic Leakage by Hardware Trojans Through Cable Geometry Manipulation
Hayato Ide, Shohei Matsumoto, Taiki Kitazawa, Shugo Kaji, Daisuke Fujimoto, Takashi Kasuga, and Yuichi Hayashi
09:50 - 10:20Coffee Break
Location: Gateway Foyer
10:20 - 11:40Hardware Hacking Session
Location: Cedar + Pine
11:40 - 12:40 Industry Track 2
Location: Cedar + Pine
IT2.1: (11:40 - 12:10) Menta
Title: How to Achieve Crypto Agility for SoCs and ASICs with Adaptable Hardware
Speaker: Jayson Bethurem, VP, Business Development, Menta eFPGA Inc.
IT2.2: (12:10 - 12:40) Cadence
Title: Design and Test of Secure Embedded Systems
Speaker: Sylvain Guilley, Cadence
12:40 - 13:50Lunch
Location: Fir + Oak
13:50 - 14:20 Visionary 2: A Look Into 2035: Sensing, Intelligence, Security, and Autonomous Systems
Location: Cedar + Pine
Moderator: Farimah Farahmandi, Univeristy of Florida
Speaker: Doug Gardner, Analog Devices
14:20 - 15:40 Panel 2: The Open Grand Challenges of Hardware Security
Location: Cedar + Pine
Moderator: Adam Kimura, Battelle

Panelists:
Rachana Maitra, Senior Principal Eng. and Security Product Manager, Marvell
Sylvain Guilley, CTO and Co-founder, Secure-IC
Ro Cammorta, Chief Scientist of Privacy-Enhanced Computing Research, Intel
Len Orlando, Senior Business Development Executive, Ansys
Jim Plusquellic, Professor, HOST Hall of Famer, University of New Mexico
15:40 - 17:00Break & Hardware Demo
Location: Sierra
17:00 - 18:00 Regular Session 9
Session Chair: Fareena Saqib, The University of North Carolina at Charlotte
Location: Cedar + Pine
9.1: Sourcing Trust From Peers with Physical Unclonable Functions
Md Sadman Siraj, Aisha B Rahman, Cyrus Minwalla, Eirini Eleni Tsiropoulou, and Jim Plusquellic
9.2: On the Impact of Metastability in Jitter-Based TRNG
Florian Pebay-Peyroula, Licinius-Pompiliu Benea, Mikael Carmona, and Romain Wacquez
9.3: Quantization Schemes for PUFs: The Entropy-Area Trade-Off
Jens Nöpel, Tim Music, Niklas Stein, Christoph Frisch, and Michael Pehl
Regular Session 10
Session Chair: Matthew Areno, Rickert Areno Engineering
Location: Cascade
10.1: cuOT: Accelerating Oblivious Transfer on GPUs for Privacy-Preserving Computation
Andrew Gan, Setsuna Yuki, Timothy Rogers, and Zahra Ghodsi
10.2: Cryptographic Least Privilege Enforcement for Scalable Memory Isolation
Martin Unterguggenberger, David Schrammel, Lukas Maar, Lukas Lamster, Vedad Hadžić, and Stefan Mangard
10.3: CHESS: Compiling Homomorphic Encryption with Scheme Switching
Rostin Shokri and Nektarios Georgios Tsoutsos
18:00 - 20:00Banquet and Award Ceremony
Location: Fir + Oak
Thursday, May 8th
07:00 - 11:00 Registration
Location: Gateway Foyer
07:00 - 08:10Coffee & Connections
Location: Gateway Foyer
08:05 - 08:10Opening Remarks
Location: Cedar + Pine
08:10 - 08:50 Keynote 3: Scaling Open-Source Silicon for Everyone
Location: Cedar + Pine
Moderator: Waleed Khalil, The Ohio State Univeristy
Speaker: Dominic Rizzo, zeroRISC
08:50 - 09:50 Regular Session 11
Session Chair: Matt Areno, Rickert-Areno Engineering
Location: Cedar + Pine
11.1: SoCureLLM: An LLM-driven Approach for Large-Scale System-on-Chip Security Verification and Policy Generation
Shams Tarek, Dipayan Saha, Sujan Kumar Saha, Mark Tehranipoor, and Farimah Farahmandi
11.2: Low-entropy Packed Binary Detection via Accurate Hardware Events Profiling
Erika Leal, Mengfei Ren, Shijia Li, and Jiang Ming
11.3: RLFuzz: Accelerating Hardware Fuzzing with Deep Reinforcement Learning
Raphael Götz, Christoph Sendner, Nico Ruck, Mohamadreza Rostami, Alexandra Dmitrienko, and Ahmad-Reza Sadeghi
Regular Session 12
Session Chair: Xiaolong Guo, Kansas State University
Location: Cascade
12.1: Reward-based Blockchain Infrastructure for 3D IC Supply Chain Provenance
Sulyab Thottungal Valapu, Aritri Saha, Bhaskar Krishnamachari, Vivek Menon, and Ujjwal Guin
12.2: RRR : Rethinking Randomized Remapping for High Performance Secured NVM LLC
Prathamesh Nitin Tanksale, Guru Raghav S. Seethiraju, Shirshendu Das, and Venkata Kalyan Tavva
12.3: Efficient CPA Attack on Hardware Implementation of ML-DSA in Post-Quantum Root of Trust
Merve Karabulut and Reza Azarderakhsh
09:50 - 10:20Break
Location: Gateway Foyer
10:20 - 10:50 Visionary 3: Smarter Silicon Security: Generative AI in SoC Verification
Location: Cedar + Pine
Moderator: Ioannis Savidis, Drexel Univeristy
Speaker: Avinash Ayalasomayajula, Caspia Technologies
10:50 - 11:50 Panel 3: Security Feud
Location: Cedar + Pine
Moderators: Adam Kimura, Ioannis Savidis, and Jim Plusquellic
11:50 - 13:10Lunch
Location: Fir + Oak
13:10 - 14:10 Regular Session 13
Session Chair: Vincent J. Mooney, Georgia Tech
Location: Cedar + Pine
13.1: Code Encryption for Confidentiality and Execution Integrity down to Control Signals
Théophile Gousselot, Jean-Max Dutertre, Olivier Potin, and Jean-Baptiste Rigaud
13.2: Termite Attacks: Gnawing on Logs to Extract Secret Information
Hyun Bin Lee, Tushar Jois, Chris Fletcher, and Carl Gunter
13.3: Securing Smart Manufacturing: Detection of Cyber-Physical Attacks in CNC-based Systems
Bethanie Williams, Rima Awad, Clifton Mulkey, Gabriela Ciocarlie, Muhammad Ismail, and Kyle Saleeby
Regular Session 14
Session Chair: Jeyavijayan Rajendran, Univeristy of Texas A&M
Location: Cascade
14.1: WattShield: A Power Side-Channel Framework for Detecting Malicious Firmware in Fused Filament Fabrication
Muhammad Ahsan and Irfan Ahmed
14.2: Breaking Confidentiality of XTS-AES Encrypted Data at Rest on Microprocessors using Electromagnetic Side-Channel Attacks
Paul Krüger, Stefan Wildermann, and Jürgen Teich
14.3: MicroPower: Micro Neural Networks for Side-Channel Attacks
Logan Reichling, Ryan Evans, Mabon Ninan, Phuc Mai, Boyang Wang, Yunsi Fei, and John Emmert
14:10 - 14:30Concluding Remarks - Program and General Chairs 2025/2026
Location: Cedar + Pine