Days: Monday, May 6th Tuesday, May 7th Wednesday, May 8th Thursday, May 9th Friday, May 10th
View this program: with abstractssession overviewtalk overview
09:00 | Property Driven Hardware Security (abstract) |
12:30 | Circuit Techniques for Energy-efficient Hardware Security (abstract) |
12:30 | System-on-Chip Platform Security Assurance: Architecture, Implementation, Validation, and Deployment (abstract) |
12:30 | Side Channel Attacks and Countermeasures (abstract) |
15:30 | Enabling a Secure Development Lifecycle for Hardware (abstract) |
15:30 | Secure Processor Architectures in the Era of Spectre and Meltdown (abstract) |
View this program: with abstractssession overviewtalk overview
Opening Remarks: HOST General and Program Chairs
KEYNOTE I
Speaker: Greg Akers, Consultative Technology Executive, Greg Akers Consulting
Title: Hardware Anchored Trust in a Software Defined World
Abstract: We will explore the composition of hardware derived trust, privacy and security in a world of untrusted software defined components. Looking at historical precedence and the likely future. We will explore the needs in a world of Quantum Computing, pervasive AI, and entirely a cloud world. As the world evolves to Not, in most aspects of our lives, we compose increasingly complex and intertwined systems that have limited verifiably robust security and trust. We will explore how critically position hardware roots of trust may improve these systems posture.
VISIONARY TALK I
Speaker: Ingrid Verbauwhede, Professor, KU Leuven - COSIC
Title: The Need for Hardware Roots of Trust
Abstract: Software security and cryptographic security protocols rely on hardware roots of trust. Software designers assume that cryptographic keys, random initial values, nonces, freshness, hardware isolation, or secure storage is simply available to them. At the same time, electronics shrink: sensor nodes, IOT devics, smart devices are becoming more and more available. Adding security and cryptography to these often very resource constraint devices is a challenge. This presentation will focus design methods for hardware roots of trustor and more specifically on Physically Unclonable Functions (PUFs) and True Random Number Generators (TRNG), two essential roots of trust.
10:15 | 156: A SCA-resilient Design Based on Dynamic Reconfiguration (abstract) |
10:23 | 157: MIRAGE: A System-Level Framework for Inserting and Evaluating Logic Obfuscation (abstract) |
10:31 | 155: Software-based Fault and Power Side-Channel Attacks inside Multi-Tenant FPGAs (abstract) |
10:39 | 154: RISC-V Secure Caches Demo on FPGA (abstract) |
10:47 | 153: Demonstration of Differential Circuit (DiffC)-PUF Addressing and Readout Platform (abstract) |
10:55 | 152: Securing Accelerators with Dynamic Information Flow Tracking (abstract) |
11:03 | 151: Experimental Cryptanalysis : Case study on chaotic random number generators (abstract) |
11:11 | 150: Security analysis of chaos-based no-equilibrium chaotic system (abstract) |
11:19 | 149: The Hardened Adversarial VET Challenge (abstract) |
11:27 | 148: Portable Power Tracer for USIM with Smart Analyzer (abstract) |
11:35 | 147: Hardware Demo of a Piezoelectric Based PUF for Hardware Security in IoT Devices (abstract) |
11:43 | 146: Remote Authentication of Low-Cost Devices using Unclonable IDs (abstract) |
11:51 | 145: A 128-bit AES Engine with Higher Resistance to Power & Electromagnetic Side-Channel Attacks Enabled by a Security-Aware Integrated All-Digital Low Dropout Regulator (abstract) |
11:59 | 158: Boot and Runtime Bitstream Authentication for FPGAs (abstract) |
12:07 | 144: An On-Chip Electromagnetic Sensor Network for Analog Trojan Detection (abstract) |
12:15 | 143: RASC: Enabling Remote Access to Side-Channels (abstract) |
12:23 | 142: Infrared Applications of FLATS: Filling Logic and Testing Spatially for FPGA Authentication and Tamper Detection (abstract) |
** denotes HOST 2019 Best Paper and Best Student Paper Nominee
## denotes HOST 2019 Best Paper Nominee
13:00 | Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption on a 32-bit Microcontroller (abstract) |
13:20 | STELLAR: A Generic EM Side-Channel Attack Protection through Ground-Up Root-cause Analysis ** (abstract) |
13:40 | High Capability and Low-Complexity: Novel Fault Detection Scheme for Finite Field Multipliers over $GF(2^m)$ based on MSPB ## (abstract) |
14:00 | Extracting side-channel leakage from round unrolled implementations of lightweight ciphers (abstract) |
14:20 | A Statistical Fault Analysis Methodology for the Ascon Authenticated Cipher (abstract) |
## denotes HOST 2019 Best Paper Nominee
15:00 | ENTT: A Family of Emerging NVM-based Trojan Triggers (abstract) |
15:20 | Golden Gates: A New hybrid Approach for Rapid Hardware Trojan Detection using Testing and Imaging ## (abstract) |
15:40 | Detecting Recycled SoCs by Exploiting Aging Induced Biases in SRAM Cells (abstract) |
16:00 | FLATS: Filling Logic and Testing Spatially for FPGA Authentication and Tamper Detection (abstract) |
16:20 | QIF-Verilog: Quantitative Information-Flow based Hardware Description Languages for Pre-Silicon Security Assessment (abstract) |
Abstract: The majority of hardware security research has been focused on critical digital circuits. This represents a portion of the actual system that is being developed for an application. This panel will discuss the other spaces such as analog, RF, package, and board. The goal is to identify some new areas of research that can help with protection of the overall hardware systems.
Panelists
- Vipul Patel, AFRL
- Adam Sherer, Cadence
- Yiorgos Makris, UTDallas
- Thomas Collins, BAE
Moderator: Saverio Fazzari (Booz Allen Hamilton)
View this program: with abstractssession overviewtalk overview
KEYNOTE II
Speaker: Ruby Lee, Forrest G. Hamrick Professor in Engineering, Princeton University
Title: Security Design Principles to Thwart Speculative Attacks
Abstract: Performance optimization features in processors can lead to serious security breaches, as exemplified by the recent Spectre, Meltdown and Foreshadow speculative attacks. These transient execution attacks show the vulnerability of processor features to timing attacks, even though they have been correctly designed and verified by existing architecture definitions. In this talk, we suggest that new security design rules need to be added to catch such vulnerabilities at design time or to detect vulnerabilities in existing machines. What are the root causes of speculative attacks and timing attacks? Can we define a small set of security design rules to prevent information leaks and other security breaches due to hardware features? Can we improve performance without degrading security? Can we design hardware architecture that improves security and performance at the same time? What new design strategies and hardware structures can lead to better security? Can we create a tool-chain that can check for potential vulnerabilities at all levels of hardware design? We are entering a new era of security in computer design, with many challenges -- and exciting research opportunities.
KEYNOTE III
Speaker: Serge Leef, Program Manager, DARPA
Title: Automatic Implementation of Secure Silicon
Abstract: Throughout the past decade, cybersecurity threats have evolved from attacks focused high in the software stack to progressively lower levels of computational hierarchy. With the explosion of popularity and growing deployment of internet connected devices, economic attackers and nation-states alike are shifting their attention to Application Specific Integrated Circuits (ASICs) that enable complex capabilities across commercial and military application domains. Despite growing recognition of the problem and a substantial body of research across multiple chip security areas, no common tools, methods or solutions are in wide use today. Modern synchronous digital ASICs are already very complex and expensive to design and incorporation of security is viewed as a burden with unclear economic benefits. The result is that the majority of today’s ASICs are largely unprotected. Absence of automation makes incorporation of security a laborious, manual task that generally requires very specific design expertise not generally possessed by semiconductor companies. These dynamics can be altered with a novel chip design flow that aims to protect advanced ASICs from known attack strategies by streamlining inclusion of scalable defense mechanisms into an automated process that maximizes architectural exploration of security vs. economics trade-offs while improving design productivity. The effort and cost to incorporate a level of hardware security aligned with application requirements and economics will be significantly reduced so that incorporation of security at all levels of hardware design is feasible and affordable.
** denotes HOST 2019 Best Paper and Best Student Paper Nominee
10:20 | A Fetching Tale: Covert Communication With The Hardware Prefetcher (abstract) |
10:40 | Using Power-Anomalies to Counter Evasive Micro-architectural Attacks in Embedded Systems ** (abstract) |
11:00 | COTSknight: Practical Defense against Cache Timing Channel Attacks using Cache Monitoring and Partitioning Technologies (abstract) |
11:20 | CoPHEE: Co-processor for Partially Homomorphic Encrypted Execution (abstract) |
11:40 | Efficient and Flexible Low-Power NTT for Lattice-Based Cryptography (abstract) |
13:00 | Improving on State Register Identification in Sequential Hardware Reverse Engineering (abstract) |
13:20 | On the Impossibility of Approximation-Resilient Circuit Locking (abstract) |
13:40 | Exploiting Proximity Information in a Satisfiability Based Attack Against Split Manufactured Circuits (abstract) |
14:00 | SURF: Joint Structural Functional Attack on Logic Locking (abstract) |
14:20 | Securing AES against Localized EM Attacks through Spatial Randomization of Dataflow (abstract) |
Abstract: In the recent years there has been a dramatic push in the use of machine learning to solve, optimize, improve or estimate various computational problems. Wide spread adoption of the Machine Learning application and apprehension of their unmatched modeling abilities, have motivated many researchers to use these powerful models for both attack and defense against system and hardware. The challenge question for this special panel is: what aspect of machine learning can impact the hardware's security? This panel will discuss various security and safety challenges in this space, and debate relevant future research opportunities.
Panelists:
- Sohrab Aftabjahani, Intel
- Paul Franzon, NCSU
- Ro Cammarota, Intel AI
- Sandip Kundu, NSF
Moderator: Farinaz Koushanfar
16:30 | 172: A CAD Framework for Machine Learning based Hardware IP Trust Verification (abstract) |
16:38 | 171: Demonstration of Exfilteration of Data through Smart Light Bulb (Internet of things) (abstract) |
16:46 | 170: Software-controlled voltage differentials-based hardware fault attack (abstract) |
16:54 | 169: System level attacks on HaHa platform (abstract) |
17:02 | 168: Securing IoT Devices in Heterogenous Network Setting using Blockchain (abstract) |
17:10 | 167: MUD "IRL" - Implementing Manufacture Usage Description (abstract) |
17:18 | 166: Demonstration of a Chaos based Unclonable RISC V Processor with Logic Locking Scheme (abstract) |
17:26 | 165: Demonstration of Enhancing the Resilience against CPA Attacks for Three-Dimensional Chips with Power Distribution Network Noise (abstract) |
17:34 | 164: Authentication of Consumables using Portable NQR Spectrometer (abstract) |
17:42 | 163: PUF-based eCash (abstract) |
17:50 | 162: Side-channel Power Resistance for Encryption Algorithms using Dynamic Partial Reconfiguration (SPREAD) (abstract) |
17:58 | 161: Structural Obfuscation of Sensitive Designs through Selective Post-Fabrication Transistor-Level Programming (abstract) |
18:06 | 160: Hardware Trojan Detection Using Backscattering Side Channel (abstract) |
18:14 | 159: Application Inference using ML based Side Channel Analysis (abstract) |
View this program: with abstractssession overviewtalk overview
VISIONARY TALK II
Speaker: Dr. Matthew Areno, Principal Engineer, Intel
Title: Challenges with System-level Security Assessment in Modern Computing Environments
Abstract: Computing systems today include more firmware on more devices than ever before. Although firmware used to be located primarily in CPU flash and executed only by the corresponding CPU, today nearly every component or device has its own firmware executed by its own processor or microcontroller. Securing all firmware data in the three key stages (at rest/in use/in transit) is typically not mandated by any specific standard and has thus created a significant challenge in attempting to assess a system’s security state. This presentation will cover current attempts by industry to address this issue, as well as discuss potential collaborations between government, industry, and academia to support this work.
VISIONARY TALK III
Speaker: Dr. Matthew Casto, Program Manager, Microelectronics, Office of the Secretary of Defense for Research and Engineering (OSD R&E)
Title: Security and Trust: Are they "Analog"ous?
Abstract: Over the last decade, a large amount of research has focused on security and trust in hardware. Security primitives and techniques have been developed to protect hardware from threats, secure the IC supply chain, and expose and address vulnerabilities. A vast majority of the research has primarily focused on digital ICs and functional verification, where analog and mixed signal (AMS) devices, systems, and analysis, which hold the highest share of risk in the market, have been neglected. The solutions developed in digital domain do not extend well to AMS systems, continuing to leave a major portion of the electronic systems market insecure and untrustworthy. This talk will focus on challenges, opportunities, and early research results in AMS ICs with a discussion on the taxonomy and applications of analog security and trust.
10:00 | MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation (abstract) |
10:20 | SIA: Secure Intermittent Architecture for Off-the-Shelf Resource-Constrained Microcontrollers (abstract) |
10:40 | RATAFIA: Ransomware Analysis using Time And Frequency Informed Autoencoders (abstract) |
11:00 | Using Hardware Software Codesign for Optimised Implementations of High-Speed and Defence in Depth CEASAR Finalists (abstract) |
11:20 | In-depth Analysis and Enhancements of RO-PUFs with a Partial Reconfiguration Framework on Xilinx Zynq-7000 SoC FPGAs (abstract) |
View this program: with abstractssession overviewtalk overview