Workshop Program

Registration


Please register for our workshop through the main conference (CHES).

Program


Time Duration Presentations
9:00 am - 9:10 am 10 mins Introduction
9:10 am - 10:00 am 50 mins Keynote 1: Security for AI and AI for Security
Deming Chen (UIUC)
[Abstract] [Slides]
10:00 am - 10:30 am 30 mins Constructing Secure Hardware Dataset to Support the Application of Large Language Models in Hardware Domain
Weimin Fu and Xiaolong Guo (Kansas State University)
[Abstract] [Slides]
10:30 am - 11:00 am 30 mins Coffee break
Session I
11:00 am - 11:30 am 30 mins New frontiers in Security Verification: Fuzzing and Penetration Testing
Farimah Farahmandi (UFL)
[Abstract] [Slides]
11:30 am - 12:00 pm 30 mins Learning to Trust DRAM in the Era of Worsening Rowhammer Vulnerability
Gururaj Saileshwar (Univ of Toronto)
[Abstract] [Slides]
Session II
12:00 pm - 12:30 pm 30 mins FHE for hardware, hardware for FHE and beyond
Anisha Mukherjee (Graz University of Technology)
[Abstract] [Slides]
12:30 pm - 1:30 pm 1 hour Lunch break
1:30 pm - 2:00 pm 30 mins Stateful Hash-based Signatures: From Theory to Practice
Nimisha Limaye (Synopsys)
[Abstract] [Slides]
Session III
2:00 pm - 2:30 pm 30 mins Unlocking CPU telemetry for software identification
Brendan Moran, Michael Bartling and Casey Battaglino (ARM)
[Abstract] [Slides]
2:30 pm - 3:00 pm 30 mins Tock: A Safe and Secure Operating System for Root-of-Trust Hardware
Brad Campbell (Univ of Virginia)
[Abstract] [Slides]
3:00 pm - 3:30 pm 30 mins Coffee break
Session IV
3:30 pm - 4:00 pm 30 mins The architecture of Arm CCA Device Assignment
Derek Miller (ARM)
[Abstract] [Slides]
4:00 pm - 4:30 pm 30 mins Faults In Our Bus: Novel Bus Fault Attacks to Break ARM TrustZone
Anirban Chakraborty (Max Planck Institute for Security and Privacy)
[Abstract] [Slides]
4:30 pm - 4:40 pm 10 mins Closing remarks

© ZTHA: Zero Trust Hardware Architectures Workshop@CHES, 2024