Group Topic | Demo |
---|---|
Group 1: Side-Channel & Post-Quantum Cryptography | Demo 197: Side-Channel Attack on Hardware Implementation of ML-DSA in Post-Quantum Root of Trust M. Karabulut, R. Azarderakhsh |
Demo 207: A Denoising Preprocess Method for Side-Channel Attacks Using Autoencoders M. Morita, T. Kojima, H. Ishii, H. Takase, H. Nakamura |
|
Demo 218: Bit-Level EM Side-Channel Disassembly of an 8-Bit MCU J. Park, J. Zhou, Md K. Bepary, U. Das, F. Farahmandi, M. Tehranipoor, E. Jung |
|
Demo 221: Integrating Post-Quantum Cryptography in Embedded IoT Systems B. Dong, Q. Wang |
|
Demo 229: Side-Channel Attacks in FPGA-Based Cloud Environments: Evaluating Prime+Probe Attacks V. Chadalavada, D. Aklekar, N. Lodge, F. Saqib |
|
Group 2: Hardware Trojans, IP Protection & Redaction | Demo 201: Unveiling Hardware Trojans through Side-Channel Analysis and Machine Learning A. K. John, S. T. Pitta, J. Dofe |
Demo 208: Hidden Trigger: Interrupt-Based Hardware Trojan Exploitation A. K. John, S. T. Pitta, J. Dofe, P. Bagmare, S. G. Wooradi |
|
Demo 216: PARS: A Layered Hardware Obfuscation Platform for Resilience and Secure Collaborative Multi-Module Designs M. Hashemi, S. Mohammadi, T. E. Carlson |
|
Demo 226: Securing VLSI Subsystems using Fingerprint Biometric-Driven Logic Locking H. Aravind, M. J. E. Xavier, K. Dharsan, S. R. Mohaprasath, N. Mohankumar |
|
Demo 228: Secure Circuit Demonstration Using Logic Locking and Fault Injection on ZedBoard N. Tambe, N. Lodge, D. Aklekar, F. Saqib |
|
Demo 230: TRAP: A Transistor-Level Programmable Fabric for Cost-Effective Hardware Redaction T. Broadfoot, Y. Makris, C. Sechen |
|
Group 3: Industrial & Embedded Security | Demo 196: Firmware Attacks on Inkredible+ 3D Bioprinter M. Ahsan, J. T. Ebode, N. Lewinski, I. Ahmed |
Demo 204: Securing PLCs with EM Side-Channels: A Non-Intrusive Approach M. S. Yaqub, R. Asmar, I. Ahmed |
|
Demo 205: EchoLogic: Audio-Based PLC Memory Monitoring for ICS Security N. Ameen, R. Vijayakanthan, A. Ayub, A. Ali-Gombe, I. Ahmed |
|
Demo 232: Power Distribution Network-Based Runtime Anomaly Detection for Embedded System Security K. Chen, X. Guo, X. Feng |
|
Group 4: PUFs, TRNGs & Hardware Authentication | Demo 219: ResCav System: Non-Destructive Microwave Resonant Cavity Technique for Integrated Circuit Authentication A. Nechiyil, R. Lee, G. Chapman |
Demo 223: S3: Securing Supposed-to-be Secure Hardware Primitives H. I. Reefat, H. Pourmehrani, M. Ebrahimabadi, J. Bahrami, Md T. H. Anik, S. Guilley, J-.L Danger, N. Karimi |
|
Demo 224: A TRNG Implemented using a Soft-Data Based Sponge Function within a Unified Strong PUF Architecture R. Cazzola, J. Plusquellic, C. Minwalla, C. Chan |
|
Demo 225: Sourcing Trust From Peers with Physical Unclonable Functions Md S. Siraj, A. B. Rahman, E. E. Tsiropoulou, C. Minwalla, J. Plusquellic |
|
Group 5: AI and Learning-based Security | Demo 217: ArduiGlitch - A learning tool to introduce power-glitch-induced instruction skips into microcontrollers H. Perrin, J.-M. Dutertre, J-. B. Rigaud |
Demo 220: Standardizing Security Assurance for IPs using SA-EDI and CWE A. Uddin, Md A. Hasan, N. Alam, S. K. Saha, F. Farahmandi, M. Tehranipoor |
|
Demo 222: SV-LLM: An Agentic LLM Framework for Hardware Security Verification D. Saha, H. Al Shaikh, S. Tarek, P. S. Nalluri, K. T. Hasan, R. Guo, Md A. Hasan, S. K. Saha, J. Zhou, M. Tehranipoor, F. Farahmandi |
|
Demo 227: Byzantine Data Poisoning: Hardware Implementation Weakening Federated Learning Security N. Lodge, V. Chadalavada, N. Tambe, F. Saqib |
|
Demo 231: LLM assisted Information Flow Tracking for the RISC-V architectures D. Aklekar, V. Chadalavada, N. Tambe, F. Saqib |