10:00 - 10:15 ET |
Welcome Remarks |
Work-in-Progress Session |
|
10:15 - 10:30 ET |
WiP: Performance and Behavior of Trusted Execution Environment and Rich Execution Environment on ARM, X86-64, and RISC-V Kuniyasu Suzaki (National Institute of Advanced Industrial Science and Technology (AIST)), Kenta Nakajima (Technology Research Association of Secure IoT Edge Application Based on RISC-V Open Architecture (TRASIO)), Tsukasa Oi (Technology Research Association of Secure IoT Edge Application Based on RISC-V Open Architecture (TRASIO)), and Akira Tsukamoto (National Institute of Advanced Industrial Science and Technology (AIST)) |
10:30 - 10:45 ET |
WiP: Systematic Attack Models for Approximate Computing Systems Pruthvy Yellu (University of New Hampshire), Landon Buell (University of New Hampshire), and Qiaoyan Yu (University of New Hampshire) |
10:45 - 11:00 ET |
WiP: E3X: ISA extensions for private computation Eduardo Chielle (New York University Abu Dhabi), Nektarios Tsoutsos (University of Delaware), Oleg Mazonka (New York University Abu Dhabi), and Michail Maniatakos (New York University Abu Dhabi) |
Cryptographic Hardware and CPU Extensions for Cryptography Session |
|
11:00 - 11:15 ET |
Implementing the Draft RISC-V Scalar Cryptography Extensions Ben Marshall (University of Bristol), Daniel Page (University of Bristol), and Thinh Pham (University of Bristol) |
11:15 - 11:30 ET |
Analysis and Hardware Optimization of Lattice Post-Quantum Cryptography Workloads Sandhya Koteshwara (IBM T J Watson Research Center), Manoj Kumar (IBM T J Watson Research Center), and Pratap Pattnaik (IBM T J Watson Research Center) |
Architecture and Security Session |
|
11:30 - 11:45 ET |
Uncovering Hidden Instructions in Armv8-A Implementations Fredrik Strupe (Silicon Labs) and Rakesh Kumar (Norwegian University of Science and Technology) |
11:45 - 12:00 ET |
Applying the Principle of Least Privilege to System Management Interrupt Handlers with the Intel SMI Transfer Monitor Brian Delagado (Intel Corp), Tejaswini Vibhute (Intel Corp), and Karen Karavanic (Portland State University) |
12:00 - 12:15 ET |
FPGA Bitstream Modification with Interconnect In Mind Michail Moraitis (KTH Royal Institute of Technology) and Elena Dubrova (KTH Royal Institute of Technology) |
Architecture Security Challenges and Opportunities Session |
|
12:15 - 12:30 ET |
Position Paper: Consider Hardware-enhanced Defenses for Rootkit Attacks Guangyuan Hu (Princeton University), Tianwei Zhang (Nanyang Technological University), and Ruby B. Lee (Princeton University) |
12:30 - 12:45 ET |
Position Paper: Defending Direct Memory Access with CHERI Capabilities A. Theodore Markettos (University of Cambridge), John Baldwin (Ararat River Consulting), Ruslan Bukin (University of Cambridge), Peter G. Neumann (SRI International), Simon W. Moore (University of Cambridge), and Robert N. M. Watson (University of Cambridge) |
12:45 - 13:00 ET |
SoK: Opportunities for Software-Hardware-Security Codesign for Next Generation Secure Computing Deeksha Dangwal (Facebook), Meghan Cowan (Facebook), Armin Alaghi (Facebook), Vincent Lee (Facebook), Brandon Reagen (New York University), and Caronline Trippel (Stanford University) |
13:00 ET |
Closing Remarks |