8:00 - 9:00 | ISCA Provided Breakfast |
9:00 - 9:10 | Welcome Remarks |
Session 1: Detecting and Preventing Attacks | |
9:10 - 9:35 |
Can Data Only Exploits be Detected at Runtime Using Hardware Events? Gildo Torres and Chen Liu (Clarkson University) Presentation Slides |
9:35 - 10:00 |
Using Scan Side Channel for Detecting IP Theft Leonid Azriel (Technion - Israel Institute of Technology), Ran Ginosar (Technion - Israel Institute of Technology), Shay Gueron (University of Haifa) and Avi Mendelson (Technion - Israel Institute of Technology) Presentation Slides |
10:00 - 10:25 |
Architectural Supports to Protect OS Kernels from Code-Injection Attacks Hyungon Moon (Seoul National University), Jinyong Lee (Seoul National University), Dongil Hwang (Seoul National University), Seonhwa Jung (Seoul National University), Jiwon Seo (Seoul National University) and Yunheung Paek (Seoul National University) Presentation Slides |
10:25 - 10:35 | Break |
Session 2: Authentication and Acceleration | |
10:35 - 11:00 |
Implicit Sensor-based Authentication of Smartphone Users with Smartwatch Wei-Han Lee (Princeton University) and Ruby Lee (Princeton University) Presentation Slides |
11:00 - 11:25 |
SIMD Instruction Set Extensions for Keccak with Applications to SHA-3, Keyak and Ketje Hemendra Rawat (Virginia Tech) and Patrick Schaumont (Virginia Tech) Presentation Slides |
11:25 - 11:35 | Break |
Session 3: Special Session: Intel SGX2 | |
11:35 - 12:05 |
Intel Software Guard Extensions (Intel SGX) Support for Dynamic Memory Management Inside an Enclave Frank McKeen, Ilya Alexandrovich, Ittai Anati, Dror Caspi, Simon Johnson, Rebekah Leslie-Hurd, Carlos Rozas (Intel Corporation) Presentation Slides |
12:05 - 12:30 |
Intel Software Guard Extensions (Intel SGX) Software Support for Dynamic Memory Allocation Inside an Enclave Bin (Cedric) Xing, Mark Shanahan, Rebekah Leslie-Hurd (Intel Corporation) Presentation Slides -- same slides as above |
12:30 - 2:00 | ISCA Provided Lunch |
Session 4: Fault and Timing Attacks | |
2:00 - 2:25 |
FAME: Fault-attack Aware Microprocessor Extensions for Hardware Fault Detection and Software Fault Response Bilgiday Yuce, Nahid Farhady Ghalaty, Chinmay Deshpande, Conor Patrick, Leyla Nazhandali and Patrick Schaumont (Virginia Tech) Presentation Slides |
2:25 - 2:50 |
Template Attacks with Partial Profiles and Dirichlet Priors: Application to Timing Attacks Eloi de Cherisey, Sylvain Guilley, Olivier Rioul and Darshana Jayasinghe (Telecom ParisTech) Presentation Slides |
2:50 - 3:15 |
A Formal Security Analysis of Even-Odd Sequential Prefetching in Profiled Cache-Timing Attacks Sarani Bhattacharya (Indian Institute of Technology, Kharagpur), Chester Rebeiro (Indian Institute of Technology, Madras) and Debdeep Mukhopadhyay (Indian Institute of Technology, Kharagpur) Presentation Slides |
3:15 - 3:40 |
Systematization of Knowledge: A Study of Using Hardware-assisted Isolated Execution Environments for Security Fengwei Zhang and Hongwei Zhang (Wayne State University) Presentation Slides |
3:40 - 3:50 | Closing Remarks |