8:00 - 9:00 | ISCA Provided Breakfast |
9:00 - 9:10 | Welcome Remarks |
Session 1: Detecting and Preventing Attacks | |
9:10 - 9:35 |
Can Data Only Exploits be Detected at Runtime Using Hardware Events? Gildo Torres and Chen Liu (Clarkson University) ![]() ![]() |
9:35 - 10:00 |
Using Scan Side Channel for Detecting IP Theft Leonid Azriel (Technion - Israel Institute of Technology), Ran Ginosar (Technion - Israel Institute of Technology), Shay Gueron (University of Haifa) and Avi Mendelson (Technion - Israel Institute of Technology) ![]() ![]() |
10:00 - 10:25 |
Architectural Supports to Protect OS Kernels from Code-Injection Attacks Hyungon Moon (Seoul National University), Jinyong Lee (Seoul National University), Dongil Hwang (Seoul National University), Seonhwa Jung (Seoul National University), Jiwon Seo (Seoul National University) and Yunheung Paek (Seoul National University) ![]() ![]() |
10:25 - 10:35 | Break |
Session 2: Authentication and Acceleration | |
10:35 - 11:00 |
Implicit Sensor-based Authentication of Smartphone Users with Smartwatch Wei-Han Lee (Princeton University) and Ruby Lee (Princeton University) ![]() ![]() |
11:00 - 11:25 |
SIMD Instruction Set Extensions for Keccak with Applications to SHA-3, Keyak and Ketje Hemendra Rawat (Virginia Tech) and Patrick Schaumont (Virginia Tech) ![]() ![]() |
11:25 - 11:35 | Break |
Session 3: Special Session: Intel SGX2 | |
11:35 - 12:05 |
Intel Software Guard Extensions (Intel SGX) Support for Dynamic Memory Management Inside an Enclave Frank McKeen, Ilya Alexandrovich, Ittai Anati, Dror Caspi, Simon Johnson, Rebekah Leslie-Hurd, Carlos Rozas (Intel Corporation) ![]() ![]() |
12:05 - 12:30 |
Intel Software Guard Extensions (Intel SGX) Software Support for Dynamic Memory Allocation Inside an Enclave Bin (Cedric) Xing, Mark Shanahan, Rebekah Leslie-Hurd (Intel Corporation) ![]() ![]() |
12:30 - 2:00 | ISCA Provided Lunch |
Session 4: Fault and Timing Attacks | |
2:00 - 2:25 |
FAME: Fault-attack Aware Microprocessor Extensions for Hardware Fault Detection and Software Fault Response Bilgiday Yuce, Nahid Farhady Ghalaty, Chinmay Deshpande, Conor Patrick, Leyla Nazhandali and Patrick Schaumont (Virginia Tech) ![]() ![]() |
2:25 - 2:50 |
Template Attacks with Partial Profiles and Dirichlet Priors: Application to Timing Attacks Eloi de Cherisey, Sylvain Guilley, Olivier Rioul and Darshana Jayasinghe (Telecom ParisTech) ![]() ![]() |
2:50 - 3:15 |
A Formal Security Analysis of Even-Odd Sequential Prefetching in Profiled Cache-Timing Attacks Sarani Bhattacharya (Indian Institute of Technology, Kharagpur), Chester Rebeiro (Indian Institute of Technology, Madras) and Debdeep Mukhopadhyay (Indian Institute of Technology, Kharagpur) ![]() ![]() |
3:15 - 3:40 |
Systematization of Knowledge: A Study of Using Hardware-assisted Isolated Execution Environments for Security Fengwei Zhang and Hongwei Zhang (Wayne State University) ![]() ![]() |
3:40 - 3:50 | Closing Remarks |