HOST 2024 | IEEE International Symposium on Hardware Oriented Security and Trust

HOST 2024 Hardware Demos


Demo NO. TITLE
Demo 1 Enhancing PLC Security using EM-SCA
Authors: Muhammad Shaharyar Yaqub, Adeen Ayub and Irfan Ahmed
Demo 2 DOMREP II
Authors: Matthias Probst, Manuel Brosch, Michael Gruber and Georg Sigl
Demo 3 Hardware Design Implementation for Secure Superconducting Quantum Computers
Authors: Theodoros Trochatos, Sanjay Deshpande and Jakub Szefer
Demo 4 Formal Verification Assisted Fuzzing Framework for Detecting SoC Vulnerability
Authors: Muhammad Monir Hossain, Nusrat Farzana Dipu, Kimia Zamiri Azar, Farimah Farahmandi and Mark Tehranipoor
Demo 5 Blockchain Enhanced CAN-FD Communication over a Secured FPGA Network
Authors: Nahush Tambe, Naseeruddin Lodge, Chaitanya Bhure and Fareena Saqib
Demo 6 Integrated Coarse and Fine Grained Information Flow Tracking Framework as a Security Policy for Crypto-Engines and RISC-V
Authors: Dhruvakumar Aklekar, Chaitanya Bhure, Vineet Chadalavada and Fareena Saqib
Demo 7 Large Language Model-Driven Real-World Applications: An Automated IC Testing System
Authors: Weimin Fu, Gang Qu and Xiaolong Guo
Demo 8 FTR-SE: A RISC-V-based open-source security subsystem
Authors: Mridha Md Mashahedur Rahman, Shams Tarek, Azim Uddin, Md Sami Ul Islam Sami, Sujan Kumar Saha, Fahim Rahman, Mark Tehranipoor and Farimah Farahmandi
Demo 9 A Moving Target Architecture as a Side-Channel Countermeasure
Authors: Rachel Cazzola and Jim Plusquellic
Demo 10 Towards Hardware Trojan Education
Authors: Victor Hayashi and Wilson Ruggiero
Demo 11 Exploiting Adress Resolution Protocol Vulnerabilities in Multi-Robot Systems
Authors: Michael Fox, Rohit Eagala, Kirthan Gaddam, Anosh Mian, Harris Laing, Blake Todorowski, Jair Ferrari and Tanvir Arafin
Demo 12 Pre-Silicon Power Side-Channel Leakage Analysis of CRYSTALS-Kyber
Authors: Nashmin Alam, Tao Zhang and Farimah Farahmandi
Demo 13 A Smart Card Emulator based Side Channel Teaching Framework
Authors: Tim Music
Demo 14 Fail-Safe Design Analysis of DEFCON on a Commercial FPGA
Authors: Priya Bhakta and Jim Plusquellic
Demo 15 Émpistos: Leveraging ARM TrustZone for Secure Machine Learning in Edge Devices
Authors: Alraheeq Almaktum Al Rawas, Zack Wagner, Maximilian Karen, Bradford Williams, Anay Gulati, Lenbert Shropshire and Md Tanvir Arafin
Demo 16 Fine-Grained Memory Protection for Zephyr with Capabilities on CHERI-RISC-V
Authors: Jennifer Jackson, Minmin Jiang, David Oswald, Adrian Shaw and Chris Dalton
Demo 17 Shift Register, Reconvergent-Fanout (SiRF) PUF Implementation on an FPGA
Authors: Jenilee Jao and Jim Plusquellic
Demo 18 Belief Propagation Attack against NTT Implementation on FPGA
Authors: Zelin Lu, Yiting Wang, Md Tanvir Arafin and Gang Qu
Demo 19 Zeno: A Compute Compartmentalization Architecture using Capabilities
Authors: Mishel Jyothis Paul, Peter Moore, Mark Donald Amobi, Edwin Kayang, Davi De Almeida, Robert Doe, Luigi Mastromauro, Marijosse Tostado, Milan Stojkov, Alan Ehret and Michel Kinsy
Demo 20 Machine Learning Advancements in Side-Channel Analysis for Robust Cryptographic Security
Authors: Vineet Chadalavada, Chaitanya Mukund Bhure, Dhruva Aklekar and Fareena Saqib
Demo 21 Lightweight In-Device Agent for PLC Security in Industrial Control Systems
Authors: Adeen Ayub and Irfan Ahmed
Demo 22 NoiseHopper: Emission Hopping Air-Gap Covert Side Channel with Lower Probability of Detection
Authors: Md Faizul Bari and Shreyas Sen
Demo 23 Security Property-Driven Laser Fault Injection Analysis
Authors: Pantha Protim Sarker, Henian Li, Farimah Farahmandi and Mark Tehranipoor
Demo 24 BioSaFe: Bioprinting security framework for in-situ process monitoring
Authors: Muhammad Ahsan, Eunice Pak, Kate Jakson, Muhammad Haris Rais, Barry Najarro-Blancas, Nastassja Lewinski and Irfan Ahmed
Demo 25 TIGER: TrIaGing KEy Refreshing Frequency via Digital Sensors
Authors: Md Toufiq Hasan Anik, Hasin Ishraq Reefat, Mohammad Ebrahimabadi, Javad Bahrami, Hossein Pourmehrani, Jean-Luc Danger, Sylvain Guilley and Naghmeh Karimi