█ Regular Sessions | █ Special Sessions | █ Keynote & Visionary Talks |
█ Plenary Events | █ Social Events | █ Tutorials & Exhibits |
Monday, May 5th | |||
10:00 - 12:00 |
T1. CPA Attack on Hardware Implementation of ML-DSA in Post-Quantum Root of Trust
Merve Karabulut - Florida Atlantic University Reza Azarderakhsh - Florida Atlantic University |
||
12:00 - 12:30 | Break | ||
12:30 - 14:30 |
T2. Introduction to IEEE 3164 Standard for Security Annotation for Electronic Design Integration (SAE-DI) based on Accellera SAE-DI and a New Approach to Identifying Security Assets Within an IP
Sohrab Aftabjahani - Intel T3. LLM for SoC Security Mark Tehranipoor - University of Florida Farimah Farahmandi - University of Florida |
||
14:30 - 15:00 | Break | ||
15:00 - 17:00 | T4. A Side-channel Analysis Primer for the Chip Designer Nicole Fern - Keysight T5. Tutorial: Security in Quantum Computing Era Jakub Szefer - Northwestern University |
Tuesday, May 6th | |||
07:00 - 08:10 | Coffee & Connections | ||
08:00 - 18:00 | Exhibitions | ||
08:10 - 08:30 | Opening Remarks | ||
08:30 - 09:10 |
Keynote 1: EU Cyber Resiliency Act (CRA) 2025: Implementation & Challenges
Moderator: Mark Tehranipoor, University of Florida Speaker: Jon Azen, Qualcomm |
||
09:10 - 09:40 |
Visionary 1: Product Security in the AI Era: Challenges and Opportunities
Moderator: Jim Plusquellic, University of New Mexico Speaker: Vivek Vedula, ARM |
||
09:40 - 10:10 | Coffee Break | ||
10:10 - 11:10 |
Regular Session 1
Session Chair: Prabhat Mishra, University of Florida 1.1: An Input Recovery Side-Channel Attack on DNN Accelerator with 3D Power Surface Le Wu, Liji Wu, Zhiwei Ba, and Xiangmin Zhang 1.2: MACPruning: Dynamic Operation Pruning to Mitigate Side-Channel DNN Model Extraction Ruyi Ding, Cheng Gongye, Davis Ranney, A. Adam Ding, and Yunsi Fei 1.3: EyeHearYou: Probing Location Identification via Occluded Smartphone Cameras and Ultrasound Nina Shamsi, Yan Long, and Kevin Fu |
Regular Session 2
Session Chair: Sohrab Aftabjahani, Intel 2.1: Betrayed by Light: How Photon Emission Microscopy Empowers Register Bit-level Laser Attacks on Microcontrollers Hugo Perrin, Jean-Max Dutertre, and Jean-Baptiste Rigaud *2.2: A System-Aware Remote Fault-Injection Attack Detection & Mitigation For Secure Heterogeneous System Amit Mazumder Shuvo, Md Latifur Rahman, Jingbo Zhou, Farimah Farahmandi, and Mark Tehranipoor 2.3: ML-EMFI: A Machine Learning-Driven Pre-Silicon Electromagnetic Fault Injection Security Evaluation for Robust IC Design Pantha Protim Sarker, Tianze Kan, Jingchen Liang, Ozgur Tuncer, Bo He, Zelin Lu, Sudarshan Mallu, Lang Lin, Norman Chang, Rikuu Hasegawa, Kazuki Monta, Makoto Nagata, Farimah Farahmandi, and Mark Tehranipoor |
|
11:10 - 12:10 |
Regular Session 3
Session Chair: Hadi Kamali, Univeristy of Central Florida 3.1: E-LoQ: Enhanced Locking for Quantum Circuit IP Protection Yuntao Liu, Jayden John, and Qian Wang *3.2: STIQ: Safeguarding Training and Inferencing of Quantum Neural Networks from Untrusted Cloud Satwik Kundu and Swaroop Ghosh 3.3: Undermining Quantum Circuit Obfuscation: Insights from Structural Analysis Donald Lushi and Samah Saeed |
Regular Session 4
Session Chair: Lang Lin, Ansys 4.1: 3D Bioprinter Firmware Attacks: Categorization, Implementation, and Impacts Muhammad Ahsan, Barry Najarro-Blancas, Johanna Tsala Ebode, Nastassja Lewinski, and Irfan Ahmed 4.2: Reverse Engineering DVFS Mechanisms Ryan Piersma, Tawhid Bhuiyan, Tanvir Ahmed Khan, and Simha Sethumadhavan *4.3: FanBleed: Stealing Your Secrets via Observing Your Cooling Fan Sisheng Liang, Zhengxiong Li, Zihao Zhan, and Zhenkai Zhang |
|
12:10 - 13:20 | Lunch | ||
13:20 - 14:40 |
Panel 1: LLMs and Cyber/Hardware Security
Moderator: Mark Tehranipoor, Univeristy of Florida Panelists: Antonio de la Serna, Principal Director, Siemens EDA Priyam Biswas, Security Research Scientist, Intel Farimah Farahmandi, Professor, University of Florida Jeremy Bellay, Safe and Reliable AI Agents Director, Battelle Farinaz Koushanfar, Professor, University of California San Diego |
||
14:40 - 15:40 |
Industry Track 1
IT1.1: (14:40 - 15:10) Synopsys Title: Nothing is more Secure than Hardware Security Speaker: Pim Tuyls, Executive Director, Security IP R&D, Synopsys IT1.2: (15:10 - 15:40) Caspia Title: From Code to Confidence: Bringing Security Automation to the Frontline of Chip Design Speaker: Beau Bakken, VP of Products, Caspia Technologies |
||
15:40 - 17:00 | Break & Hardware Demo | ||
17:00 - 18:00 |
Regular Session 5
Session Chair: Adam Kimura, Battelle 5.1: USBSnoop - Revealing Device Activities via USB Congestions Davis Ranney, Yufei Wang, Yunsi Fei, and Adam Ding 5.2: Traffic Analysis Attacks on Wireless NoC-based SoCs Hansika Weerasena and Prabhat Mishra 5.3: DOME: Automated Validation of Data-Oblivious Program Execution Donayam Benti and Todd Austin |
Regular Session 6
Session Chair: Christopher Clark, Georgia Tech Research Institute *6.1: WaveSleuth: Retrospective PLC Memory for Anomaly Detection in Industrial Control Systems Nehal Ameen, Ramyapandian Vijayakanthan, Adeen Ayub, Aisha Ali-Gombe, and Irfan Ahmed 6.2: EvoWeight: Sponge Poisoning of FPGA-based DNN Accelerators in Differential Private Secure Federated Learning Muhammad Shakeel Akram, Vincent Meyers, Mehdi Tahoori, Bogaraju Sharatchandra Varma, and Dewar Finlay 6.3: LAPD: Lifecycle-Aware Power-Based Malware Detection Alexander Cathis, Mulong Luo, Mohit Tiwari, and Andreas Gerstlauer |
Wednesday, May 7th | |||
07:00 - 08:10 | Coffee & Connections | ||
08:00 - 18:30 | Exhibitions | ||
08:10 - 08:50 |
Keynote 2: Silicon Sentinels: How Breakthrough Innovations are Reinventing Trust in Hardware
Moderator: Ujjwal Guin, Auburn University Speaker: Dhinesh Manoharan, Intel |
||
08:50 - 11:40 |
Ph.D. Dissertation Competition
|
||
08:50 - 09:50 |
Regular Session 7
Session Chair: Irfan Ahmed, Virginia Commonwealth University 7.1: Michscan: Black-Box Neural Network Integrity Checking at Runtime Through Power Analysis Robi Paul and Michael Zuzak 7.2: AccessShadow: Leveraging Adversarial Samples to Counter Deep Learning-Assisted Cache Timing Attacks Xiang Zhang, Ziyue Zhang, A. Adam Ding, and Yunsi Fei 7.3: Input-Triggered Hardware Trojan Attack on Spiking Neural Networks Spyridon Raptis, Paul Kling, Ioannis Kaskampas, Ihsen Alouani and Haralampos-G. Stratigopoulos |
Regular Session 8
Session Chair: Ioannis Savidis, Drexel University 8.1: Trojan Localization in Generic AMS Circuits from Combined Power and Functional Queries Dipali Jain, Shakil Ahmed, Guangwei Zhao, Rajesh Datta, and Kaveh Shamsi 8.2: Evaluating the Effectiveness of Hardware Trojan Detection Approaches at RTL Ruochen Dai, Zhaoxiang Liu, Orlando Arias, Xiaolong Guo, and Tuba Yavuz 8.3: Electromagnetic Information Leakage Induced by Hardware Trojans Constructed by Cable Geometry Manipulation Hayato Ide, Shohei Matsumoto, Taiki Kitazawa, Shugo Kaji, Daisuke Fujimoto, Takashi Kasuga, and Yuichi Hayashi |
|
09:50 - 10:20 | Coffee Break | ||
10:20 - 11:40 | Hacking | ||
11:40 - 12:40 |
Industry Track 2
IT2.1: (11:40 - 12:10) Menta Title: How to Achieve Crypto Agility for SoCs and ASICs with Adaptable Hardware Speaker: Jayson Bethurem, VP, Business Development, Menta eFPGA Inc. IT2.2: (12:10 - 12:40) Cadence Speaker: Sylvain Guilley, Cadence |
||
12:40 - 13:50 | Lunch | ||
13:50 - 14:20 |
Visionary 2: A Look Into 2035: Sensing, Intelligence, Security, and Autonomous Systems
Moderator: Farimah Farahmandi, Univeristy of Florida Speaker: Doug Gardner, Analog Devices |
||
14:20 - 15:40 |
Panel 2: The Open Grand Challenges of Hardware Security
Moderator: Adam Kimura, Battelle Panelists: Rachana Maitra, Senior Principal Eng. and Security Product Manager, Marvell Sylvain Guilley, CTO and Co-founder, Secure-IC Ro Cammorta, Chief Scientist of Privacy-Enhanced Computing Research, Intel Len Orlando, Senior Business Development Executive, Ansys Jim Plusquellic, Professor, HOST Hall of Famer, University of New Mexico |
||
15:40 - 17:00 | Break & Hardware Demo | ||
17:00 - 18:00 |
Regular Session 9
Session Chair: Fareena Saqib, The University of North Carolina at Charlotte 9.1: Sourcing Trust From Peers with Physical Unclonable Functions Md Sadman Siraj, Aisha B Rahman, Cyrus Minwalla, Eirini Eleni Tsiropoulou, and Jim Plusquellic 9.2: On the Impact of Metastability in Jitter-Based TRNG Florian Pebay-Peyroula, Licinius-Pompiliu Benea, Mikael Carmona, and Romain Wacquez 9.3: Quantization Schemes for PUFs: The Entropy-Area Trade-Off Jens Nöpel, Tim Music, Niklas Stein, Christoph Frisch, and Michael Pehl |
Regular Session 10
Session Chair: Matthew Areno, Rickert Areno Engineering 10.1: cuOT: Accelerating Oblivious Transfer on GPUs for Privacy-Preserving Computation Andrew Gan, Setsuna Yuki, Timothy Rogers, and Zahra Ghodsi 10.2: Cryptographic Least Privilege Enforcement for Scalable Memory Isolation Martin Unterguggenberger, David Schrammel, Lukas Maar, Lukas Lamster, Vedad Hadžić, and Stefan Mangard 10.3: CHESS: Compiling Homomorphic Encryption with Scheme Switching Rostin Shokri and Nektarios Georgios Tsoutsos |
|
18:00 - 20:00 | Banquet and Award Ceremony |
Thursday, May 8th | |||
07:00 - 08:10 | Coffee & Connections | ||
08:10 - 08:50 |
Keynote 3: Scaling Open-Source Silicon for Everyone
Moderator: Naghmeh Karimi, University of Maryland, Baltimore County Speaker: Dominic Rizzo, zeroRISC |
||
08:50 - 09:50 |
Regular Session 11
Session Chair: Kimai Azar, University of Central Florida 11.1: SoCureLLM: An LLM-driven Approach for Large-Scale System-on-Chip Security Verification and Policy Generation Shams Tarek, Dipayan Saha, Sujan Kumar Saha, Mark Tehranipoor, and Farimah Farahmandi 11.2: Low-entropy Packed Binary Detection via Accurate Hardware Events Profiling Erika Leal, Mengfei Ren, Shijia Li, and Jiang Ming 11.3: RLFuzz: Accelerating Hardware Fuzzing with Deep Reinforcement Learning Raphael Götz, Christoph Sendner, Nico Ruck, Mohamadreza Rostami, Alexandra Dmitrienko, and Ahmad-Reza Sadeghi |
Regular Session 12
Session Chair: Xiaolong Guo, Kansas State University 12.1: Reward-based Blockchain Infrastructure for 3D IC Supply Chain Provenance Sulyab Thottungal Valapu, Aritri Saha, Bhaskar Krishnamachari, Vivek Menon, and Ujjwal Guin 12.2: RRR : Rethinking Randomized Remapping for High Performance Secured NVM LLC Prathamesh Nitin Tanksale, Guru Raghav S. Seethiraju, Shirshendu Das, and Venkata Kalyan Tavva 12.3: Efficient CPA Attack on Hardware Implementation of ML-DSA in Post-Quantum Root of Trust Merve Karabulut and Reza Azarderakhsh |
|
09:50 - 10:20 | Break | ||
10:20 - 10:50 |
Visionary 3: Smarter Silicon Security: Generative AI in SoC Verification
Moderator: Waleed Khalil, The Ohio State Univeristy Speaker: Avinash Ayalasomayajula, Caspia Technologies |
||
10:50 - 11:50 | Special Mystery Panel | ||
11:50 - 13:10 | Lunch | ||
13:10 - 14:10 |
Regular Session 13
Session Chair: Vincent J. Mooney, Georgia Tech 13.1: Code Encryption for Confidentiality and Execution Integrity down to Control Signals Théophile Gousselot, Jean-Max Dutertre, Olivier Potin, and Jean-Baptiste Rigaud 13.2: Termite Attacks: Gnawing on Logs to Extract Secret Information Hyun Bin Lee, Tushar Jois, Chris Fletcher, and Carl Gunter 13.3: Securing Smart Manufacturing: Detection of Cyber-Physical Attacks in CNC-based Systems Bethanie Williams, Rima Awad, Clifton Mulkey, Gabriela Ciocarlie, Muhammad Ismail, and Kyle Saleeby |
Regular Session 14
Session Chair: Jeyavijayan Rajendran, Univeristy of Texas A&M 14.1: WattShield: A Power Side-Channel Framework for Detecting Malicious Firmware in Fused Filament Fabrication Muhammad Ahsan and Irfan Ahmed 14.2: Breaking Confidentiality of XTS-AES Encrypted Data at Rest on Microprocessors using Electromagnetic Side-Channel Attacks Paul Krüger, Stefan Wildermann, and Jürgen Teich 14.3: MicroPower: Micro Neural Networks for Side-Channel Attacks Logan Reichling, Ryan Evans, Mabon Ninan, Phuc Mai, Boyang Wang, Yunsi Fei, and John Emmert |
|
14:10 - 14:30 | Concluding Remarks - Program and General Chairs 2025/2026 |