Program
Time | Duration | Presentations | ||
---|---|---|---|---|
9:00 am - 9:10 am | 10 mins | Introduction | ||
9:10 am - 10:00 am | 50 mins | Keynote 1: Security for AI and AI for Security Deming Chen (UIUC) |
[Abstract] | [Slides] |
10:00 am - 10:30 am | 30 mins | Constructing Secure Hardware Dataset to Support the Application of Large Language Models in Hardware Domain Weimin Fu and Xiaolong Guo (Kansas State University) |
[Abstract] | [Slides] |
10:30 am - 11:00 am | 30 mins | Coffee break | ||
Session I | ||||
11:00 am - 11:30 am | 30 mins | New frontiers in Security Verification: Fuzzing and Penetration Testing Farimah Farahmandi (UFL) |
[Abstract] | [Slides] |
11:30 am - 12:00 pm | 30 mins | Learning to Trust DRAM in the Era of Worsening Rowhammer Vulnerability Gururaj Saileshwar (Univ of Toronto) |
[Abstract] | [Slides] |
Session II | ||||
12:00 pm - 12:30 pm | 30 mins | FHE for hardware, hardware for FHE and beyond Anisha Mukherjee (Graz University of Technology) |
[Abstract] | [Slides] |
12:30 pm - 1:30 pm | 1 hour | Lunch break | ||
1:30 pm - 2:00 pm | 30 mins | Stateful Hash-based Signatures: From Theory to Practice Nimisha Limaye (Synopsys) |
[Abstract] | [Slides] |
Session III | ||||
2:00 pm - 2:30 pm | 30 mins | Unlocking CPU telemetry for software identification Brendan Moran, Michael Bartling and Casey Battaglino (ARM) |
[Abstract] | [Slides] |
2:30 pm - 3:00 pm | 30 mins | Tock: A Safe and Secure Operating System for Root-of-Trust Hardware Brad Campbell (Univ of Virginia) |
[Abstract] | [Slides] |
3:00 pm - 3:30 pm | 30 mins | Coffee break | ||
Session IV | ||||
3:30 pm - 4:00 pm | 30 mins | The architecture of Arm CCA Device Assignment Derek Miller (ARM) |
[Abstract] | [Slides] |
4:00 pm - 4:30 pm | 30 mins | Faults In Our Bus: Novel Bus Fault Attacks to Break ARM TrustZone Anirban Chakraborty (Max Planck Institute for Security and Privacy) |
[Abstract] | [Slides] |
4:30 pm - 4:40 pm | 10 mins | Closing remarks |
© ZTHA: Zero Trust Hardware Architectures Workshop@CHES, 2024