SEED 2024

May 16-17, 2024

 Orlando, Florida


CONFERENCE PROGRAM

Thursday, May 16, 2024
8:00 - 9:00am Breakfast
9:00 - 9:15am Opening Session
9:15 - 10:15 am Keynote 1: Jakub Szefer (Yale University)
10:15 - 10:40am Coffee Break
10:40 - 12:00pm Session 1: Side Channel Attacks
Session Chair: Yanan Guo (University of Pittsburgh)
12:00 - 1:30pm Lunch
1:30 - 2:50 pm Session 2: Hardware-based Defenses
Session Chair: Todd Austin (University of Michigan)
2:50 - 3:10pm Coffee Break
3:10 - 4:10 pm Session 3: Secure Execution Environments
Session Chair: Naveed Ul Mustafa (University of Central Florida)
4:10 - 5:10 pm Poster Session
6:00 - 8:00 pm Conference Dinner
Friday, May 17, 2024
8:00 - 9:00 am Breakfast
9:00 - 10:00am Keynote 2: Farimah Farahmandi (University of Florida)
10:00 - 10:30am Coffee Break
10:30 - 11:50am Session 4: Crypto Hardware and Accelerations
Session Chair: Jongouk Choi (University of Central Florida)
12:00 - 1:00 am Lunch and Closing


Detailed Program

Day 1
8:00 - 9:00 am Breakfast
9:00 - 9:15 am Opening Session
9:15 - 10:15 am Keynote 1: Computer Security in Quantum Computing Era --Prof. Jakub Szefer, Yale University
10:15 - 10:40 am Coffee Break
10:40 - 12:00 pm
Session 1: Side Channel Attacks
Extending FPGA Information Leaks with Trojan Phantom Circuits.
Anthony Etim, Shanquan Tian, and Jakub Szefer (Yale University).
Tail Victims in Termination Timing Channel Defenses beyond Cryptographic Kernels.
Shijia Wei (UT Austin), Austin Harris (UT Austin), Yongye Zhu (UIUC), Prakash Ramrakhyani (ARM), Calvin Lin (UT Austin), Mohit Tiwari (UT Austin).
Channelizer: Explainable ML Inference for Validating Side-Channel Resistant Systems.
Donayam Benti and Todd Austin (University of Michigan).
Beyond the Bridge: Contention-Based Covert and Side Channel Attacks on Multi-GPU Interconnect.
Yicheng Zhang, Ravan Nazaraliyev, Sankha Baran Dutta, Nael Abu-Ghazaleh, Andres Marquez, Kevin Barker (University of California at Riverside).
12:00 - 1:30 pm Lunch
1:30 - 2:50 pm
Session 2: Hardware-based Defenses
INTERFACE: An Indirect, Partitioned, Random, Fully-Associative Cache to Avoid Shared Last-Level Cache Attacks.
Yonas Kelemework and Alaa R. Alameldeen (Simon Fraser University).
MAYA: Hardware Enhanced Customizable Defenses at the User-Kernel Interface.
Preet Derasari and Guru Venkataramani (George Washington University).
A First Exploration of Fine-Grain Coherence for Integrity Metadata.
Per Ekemark (Uppsala University), Alberto Ros (Universidad de Murcia), Konstantinos Sagonas (Uppsala University & National Technical University of Athens), Stefanos Kaxiras (Uppsala University).
Best Paper Candidate
Extending and Defending Attacks on Reset Operations in Quantum Computers.
Jerry Tan, Chuanqi Xu, Theodoros Trochatos, and Jakub Szefer (Yale University).
Best Paper
2:50 - 3:10 pm Break
3:10 - 4:10 pm
Session 3: Secure Execution Environments
SSE: Security Service Engines to Scale Enclave Parallelism for System Interactive Applications.
Jared Nye, Usman Ali, and Omer Khan (University of Connecticut).
Best Paper Candidate
Invited paper: Trusted Execution Environments in Embedded and IoT Systems: A CactiLab Perspective.
Ziming Zhao, Md Armanuzzaman, Xi Tan, Zheyuan Ma (University of Buffalo).
Invited paper: SoK: A Comparison Study of Arm TrustZone and CCA.
Haoyang Huang (Southern University of Science and Technology), Fengwei Zhang (Southern University of Science and Technology), Shoumeng Yan (Ant Group), Tao Wei (Ant Group), Zhengyu He (Ant Group).
4:10 - 5:10 pm Poster Session
Microarchitectural Attacks and Defenses in Modern Speculatively-updated Branch Predictors.
TrojLLM: A Black-box Trojan Prompt Attack on Large Language Models.
Holy Macroni! Finding Macro Usage Errors in the Linux Kernel.
VITA: A ViT-based Acceleration Framework via Hardware-Algorithm Co-Design.
Fast Enclave Launch: Efficient Enclave Launching for Secure Serverless Cloud Computing.
Processing In-Memory Workflow Recovery Using Power Based Side Channels.
Security of Automotive Embedded Systems.
Encrypted Arithmetic Operations Using a Dynamic Key.
DeepVenom: Persistent DNN Backdoors Exploiting Transient Weight Perturbations in Memories.
Detecting Hardware Trojans Using Power Analysis.
PD-LOaPP - Accelerating the Performance of PMOs through Prediction and DRAM.
Neural Network Fault Protection using Ensemble Redundancy.
6:00 - 8:30 pm Conference Dinner
Day 2
8:00 - 9:00 am Breakfast
9:00 - 10:00 am Keynote 2: Unveiling Security Engine's Time Machine: A Journey Through History and a Look into the Future -- Prof. Farimah Farahmandi, University of Florida
10:00 - 10:30 am Break
10:30 - 11:50 am
Session 4: Crypto Hardware and Accelerations
CiFHER: A Chiplet-Based FHE Accelerator with a Resizable Structure.
Sangpyo Kim, Jongmin Kim, Jae Young Choi, Jung Ho Ahn (Seoul National University).
LOaPP: Improving the performance of Persistent Memory Objects via Low-Overhead at-rest PMO Protection.
Derrick Greenspan, Naveed Ul Mustafa, Andres Delgado, Connor Bramham, Christopher Prats, Samu Wallace, Mark Heinrich, Yan Solihin (University of Central Florida).
SoK: Opportunities for Accelerating Multi-Party Computation via Trusted Hardware.
Tong Liu (Southern University of Science and Technology), Zhen Huang (Shanghai Jiao Tong University), Jiaao Li (Tsinghua University), Jianyu Niu (Southern University of Science and Technology), Guoxing Chen (Shanghai Jiao Tong University), Yinqian Zhang (Southern University of Science and Technology).
Aggregate Encryption Individual Decryption for FPGA Bitstream Protection on Cloud.
Mukta Debnath (Indian Statistical Institute Kolkata), Krishnendu Guha (University College Cork), Debasri Saha (University of Calcutta), Susmita Sur-Kolay (Indian Statistical Institute Kolkata).
12:00 - 1:00 pm Lunch and Closing