Demo NO. |
TITLE |
Demo 1 |
Enhancing PLC Security using EM-SCA
Authors: Muhammad Shaharyar Yaqub, Adeen Ayub and Irfan Ahmed
|
Demo 2 |
DOMREP II
Authors: Matthias Probst, Manuel Brosch, Michael Gruber and Georg Sigl
|
Demo 3 |
Hardware Design Implementation for Secure Superconducting Quantum Computers
Authors: Theodoros Trochatos, Sanjay Deshpande and Jakub Szefer
|
Demo 4 |
Formal Verification Assisted Fuzzing Framework for Detecting SoC Vulnerability
Authors: Muhammad Monir Hossain, Nusrat Farzana Dipu, Kimia Zamiri Azar, Farimah Farahmandi and Mark Tehranipoor
|
Demo 5 |
Blockchain Enhanced CAN-FD Communication over a Secured FPGA Network
Authors: Nahush Tambe, Naseeruddin Lodge, Chaitanya Bhure and Fareena Saqib
|
Demo 6 |
Integrated Coarse and Fine Grained Information Flow Tracking Framework as a Security Policy for Crypto-Engines and RISC-V
Authors: Dhruvakumar Aklekar, Chaitanya Bhure, Vineet Chadalavada and Fareena Saqib
|
Demo 7 |
Large Language Model-Driven Real-World Applications: An Automated IC Testing System
Authors: Weimin Fu, Gang Qu and Xiaolong Guo
|
Demo 8 |
FTR-SE: A RISC-V-based open-source security subsystem
Authors: Mridha Md Mashahedur Rahman, Shams Tarek, Azim Uddin, Md Sami Ul Islam Sami, Sujan Kumar Saha, Fahim Rahman, Mark Tehranipoor and Farimah Farahmandi
|
Demo 9 |
A Moving Target Architecture as a Side-Channel Countermeasure
Authors: Rachel Cazzola and Jim Plusquellic
|
Demo 10 |
Towards Hardware Trojan Education
Authors: Victor Hayashi and Wilson Ruggiero
|
Demo 11 |
Exploiting Adress Resolution Protocol Vulnerabilities in Multi-Robot Systems
Authors: Michael Fox, Rohit Eagala, Kirthan Gaddam, Anosh Mian, Harris Laing, Blake Todorowski, Jair Ferrari and Tanvir Arafin
|
Demo 12 |
Pre-Silicon Power Side-Channel Leakage Analysis of CRYSTALS-Kyber
Authors: Nashmin Alam, Tao Zhang and Farimah Farahmandi
|
Demo 13 |
A Smart Card Emulator based Side Channel Teaching Framework
Authors: Tim Music
|
Demo 14 |
Fail-Safe Design Analysis of DEFCON on a Commercial FPGA
Authors: Priya Bhakta and Jim Plusquellic
|
Demo 15 |
Émpistos: Leveraging ARM TrustZone for Secure Machine Learning in Edge Devices
Authors: Alraheeq Almaktum Al Rawas, Zack Wagner, Maximilian Karen, Bradford Williams, Anay Gulati, Lenbert Shropshire and Md Tanvir Arafin
|
Demo 16 |
Fine-Grained Memory Protection for Zephyr with Capabilities on CHERI-RISC-V
Authors: Jennifer Jackson, Minmin Jiang, David Oswald, Adrian Shaw and Chris Dalton
|
Demo 17 |
Shift Register, Reconvergent-Fanout (SiRF) PUF Implementation on an FPGA
Authors: Jenilee Jao and Jim Plusquellic
|
Demo 18 |
Belief Propagation Attack against NTT Implementation on FPGA
Authors: Zelin Lu, Yiting Wang, Md Tanvir Arafin and Gang Qu
|
Demo 19 |
Zeno: A Compute Compartmentalization Architecture using Capabilities
Authors: Mishel Jyothis Paul, Peter Moore, Mark Donald Amobi, Edwin Kayang, Davi De Almeida, Robert Doe, Luigi Mastromauro, Marijosse Tostado, Milan Stojkov, Alan Ehret and Michel Kinsy
|
Demo 20 |
Machine Learning Advancements in Side-Channel Analysis for Robust Cryptographic Security
Authors: Vineet Chadalavada, Chaitanya Mukund Bhure, Dhruva Aklekar and Fareena Saqib
|
Demo 21 |
Lightweight In-Device Agent for PLC Security in Industrial Control Systems
Authors: Adeen Ayub and Irfan Ahmed
|
Demo 22 |
NoiseHopper: Emission Hopping Air-Gap Covert Side Channel with Lower Probability of Detection
Authors: Md Faizul Bari and Shreyas Sen
|
Demo 23 |
Security Property-Driven Laser Fault Injection Analysis
Authors: Pantha Protim Sarker, Henian Li, Farimah Farahmandi and Mark Tehranipoor
|
Demo 24 |
BioSaFe: Bioprinting security framework for in-situ process monitoring
Authors: Muhammad Ahsan, Eunice Pak, Kate Jakson, Muhammad Haris Rais, Barry Najarro-Blancas, Nastassja Lewinski and Irfan Ahmed
|
Demo 25 |
TIGER: TrIaGing KEy Refreshing Frequency via Digital Sensors
Authors: Md Toufiq Hasan Anik, Hasin Ishraq Reefat, Mohammad Ebrahimabadi, Javad Bahrami, Hossein Pourmehrani, Jean-Luc Danger, Sylvain Guilley and Naghmeh Karimi
|