Call for Papers


Program Committee


Past workshops:

HASP 2019
HASP 2018
HASP 2017
HASP 2016
HASP 2015
HASP 2014
HASP 2013
HASP 2012

Hardware and Architectural Support for Security and Privacy (HASP) 2020

To be held October 17, 2020 -- virtually in conjunction with MICRO 2020

Workshop Program

The workshop will take place virtually via Zoom. The presentations will occur as listed below, starting at 10:00 ET on Oct. 17, 2020. Please register for MICRO to get access to the Whova web page (or app) and the Zoom links for the presentations.

10:00 - 10:15 ET Welcome Remarks

Work-in-Progress Session

10:15 - 10:30 ET WiP: Performance and Behavior of Trusted Execution Environment and Rich Execution Environment on ARM, X86-64, and RISC-V
Kuniyasu Suzaki (National Institute of Advanced Industrial Science and Technology (AIST)), Kenta Nakajima (Technology Research Association of Secure IoT Edge Application Based on RISC-V Open Architecture (TRASIO)), Tsukasa Oi (Technology Research Association of Secure IoT Edge Application Based on RISC-V Open Architecture (TRASIO)), and Akira Tsukamoto (National Institute of Advanced Industrial Science and Technology (AIST))
10:30 - 10:45 ET WiP: Systematic Attack Models for Approximate Computing Systems
Pruthvy Yellu (University of New Hampshire), Landon Buell (University of New Hampshire), and Qiaoyan Yu (University of New Hampshire)
10:45 - 11:00 ET WiP: E3X: ISA extensions for private computation
Eduardo Chielle (New York University Abu Dhabi), Nektarios Tsoutsos (University of Delaware), Oleg Mazonka (New York University Abu Dhabi), and Michail Maniatakos (New York University Abu Dhabi)
Cryptographic Hardware and CPU Extensions for Cryptography Session

11:00 - 11:15 ET Implementing the Draft RISC-V Scalar Cryptography Extensions
Ben Marshall (University of Bristol), Daniel Page (University of Bristol), and Thinh Pham (University of Bristol)
11:15 - 11:30 ET Analysis and Hardware Optimization of Lattice Post-Quantum Cryptography Workloads
Sandhya Koteshwara (IBM T J Watson Research Center), Manoj Kumar (IBM T J Watson Research Center), and Pratap Pattnaik (IBM T J Watson Research Center)
Architecture and Security Session

11:30 - 11:45 ET Uncovering Hidden Instructions in Armv8-A Implementations
Fredrik Strupe (Silicon Labs) and Rakesh Kumar (Norwegian University of Science and Technology)
11:45 - 12:00 ET Applying the Principle of Least Privilege to System Management Interrupt Handlers with the Intel SMI Transfer Monitor
Brian Delagado (Intel Corp), Tejaswini Vibhute (Intel Corp), and Karen Karavanic (Portland State University)
12:00 - 12:15 ET FPGA Bitstream Modification with Interconnect In Mind
Michail Moraitis (KTH Royal Institute of Technology) and Elena Dubrova (KTH Royal Institute of Technology)
Architecture Security Challenges and Opportunities Session

12:15 - 12:30 ET Position Paper: Consider Hardware-enhanced Defenses for Rootkit Attacks
Guangyuan Hu (Princeton University), Tianwei Zhang (Nanyang Technological University), and Ruby B. Lee (Princeton University)
12:30 - 12:45 ET Position Paper: Defending Direct Memory Access with CHERI Capabilities
A. Theodore Markettos (University of Cambridge), John Baldwin (Ararat River Consulting), Ruslan Bukin (University of Cambridge), Peter G. Neumann (SRI International), Simon W. Moore (University of Cambridge), and Robert N. M. Watson (University of Cambridge)
12:45 - 13:00 ET SoK: Opportunities for Software-Hardware-Security Codesign for Next Generation Secure Computing
Deeksha Dangwal (Facebook), Meghan Cowan (Facebook), Armin Alaghi (Facebook), Vincent Lee (Facebook), Brandon Reagen (New York University), and Caronline Trippel (Stanford University)
13:00 ET Closing Remarks