SEED 2024
May 16-17, 2024
Orlando, Florida
CONFERENCE PROGRAM
Thursday, May 16, 2024 | |
---|---|
8:00 - 9:00am | Breakfast |
9:00 - 9:15am | Opening Session |
9:15 - 10:15 am | Keynote 1: Jakub Szefer (Yale University) |
10:15 - 10:40am | Coffee Break |
10:40 - 12:00pm | Session 1: Side Channel Attacks Session Chair: Yanan Guo (University of Pittsburgh) |
12:00 - 1:30pm | Lunch |
1:30 - 2:50 pm | Session 2: Hardware-based Defenses Session Chair: Todd Austin (University of Michigan) |
2:50 - 3:10pm | Coffee Break |
3:10 - 4:10 pm | Session 3: Secure Execution Environments Session Chair: Naveed Ul Mustafa (University of Central Florida) |
4:10 - 5:10 pm | Poster Session |
6:00 - 8:00 pm | Conference Dinner |
Friday, May 17, 2024 | |
---|---|
8:00 - 9:00 am | Breakfast |
9:00 - 10:00am | Keynote 2: Farimah Farahmandi (University of Florida) |
10:00 - 10:30am | Coffee Break |
10:30 - 11:50am | Session 4: Crypto Hardware and Accelerations Session Chair: Jongouk Choi (University of Central Florida) |
12:00 - 1:00 am | Lunch and Closing |
Detailed Program
Day 1 | |
---|---|
8:00 - 9:00 am | Breakfast |
9:00 - 9:15 am | Opening Session |
9:15 - 10:15 am | Keynote 1: Computer Security in Quantum Computing Era --Prof. Jakub Szefer, Yale University |
10:15 - 10:40 am | Coffee Break |
10:40 - 12:00 pm |
Session 1: Side Channel Attacks
|
Extending FPGA Information Leaks with Trojan Phantom Circuits.
Anthony Etim, Shanquan Tian, and Jakub Szefer (Yale University).
| |
Tail Victims in Termination Timing Channel Defenses beyond Cryptographic Kernels.
Shijia Wei (UT Austin), Austin Harris (UT Austin), Yongye Zhu (UIUC), Prakash Ramrakhyani (ARM), Calvin Lin (UT Austin), Mohit Tiwari (UT Austin).
| |
Channelizer: Explainable ML Inference for Validating Side-Channel Resistant Systems.
Donayam Benti and Todd Austin (University of Michigan).
| |
Beyond the Bridge: Contention-Based Covert and Side Channel Attacks on Multi-GPU Interconnect.
Yicheng Zhang, Ravan Nazaraliyev, Sankha Baran Dutta, Nael Abu-Ghazaleh, Andres Marquez, Kevin Barker (University of California at Riverside).
|
|
12:00 - 1:30 pm | Lunch |
1:30 - 2:50 pm |
Session 2: Hardware-based Defenses
|
INTERFACE: An Indirect, Partitioned, Random, Fully-Associative Cache to Avoid Shared Last-Level Cache Attacks.
Yonas Kelemework and Alaa R. Alameldeen (Simon Fraser University).
|
|
MAYA: Hardware Enhanced Customizable Defenses at the User-Kernel Interface.
Preet Derasari and Guru Venkataramani (George Washington University).
|
|
A First Exploration of Fine-Grain Coherence for Integrity Metadata.
Per Ekemark (Uppsala University), Alberto Ros (Universidad de Murcia), Konstantinos Sagonas (Uppsala University & National Technical University of Athens), Stefanos Kaxiras (Uppsala University).
Best Paper Candidate
| |
Extending and Defending Attacks on Reset Operations in Quantum Computers.
Jerry Tan, Chuanqi Xu, Theodoros Trochatos, and Jakub Szefer (Yale University).
Best Paper
|
|
2:50 - 3:10 pm | Break |
3:10 - 4:10 pm |
Session 3: Secure Execution Environments
|
SSE: Security Service Engines to Scale Enclave Parallelism for System Interactive Applications.
Jared Nye, Usman Ali, and Omer Khan (University of Connecticut).
Best Paper Candidate
| |
Invited paper: Trusted Execution Environments in Embedded and IoT Systems: A CactiLab Perspective.
Ziming Zhao, Md Armanuzzaman, Xi Tan, Zheyuan Ma (University of Buffalo).
|
|
Invited paper: SoK: A Comparison Study of Arm TrustZone and CCA.
Haoyang Huang (Southern University of Science and Technology), Fengwei Zhang (Southern University of Science and Technology), Shoumeng Yan (Ant Group), Tao Wei (Ant Group), Zhengyu He (Ant Group).
|
|
4:10 - 5:10 pm | Poster Session |
Microarchitectural Attacks and Defenses in Modern Speculatively-updated Branch Predictors.
TrojLLM: A Black-box Trojan Prompt Attack on Large Language Models.
Holy Macroni! Finding Macro Usage Errors in the Linux Kernel.
VITA: A ViT-based Acceleration Framework via Hardware-Algorithm Co-Design.
Fast Enclave Launch: Efficient Enclave Launching for Secure Serverless Cloud Computing.
Processing In-Memory Workflow Recovery Using Power Based Side Channels.
Security of Automotive Embedded Systems.
Encrypted Arithmetic Operations Using a Dynamic Key.
DeepVenom: Persistent DNN Backdoors Exploiting Transient Weight Perturbations in Memories.
Detecting Hardware Trojans Using Power Analysis.
PD-LOaPP - Accelerating the Performance of PMOs through Prediction and DRAM.
Neural Network Fault Protection using Ensemble Redundancy.
| |
6:00 - 8:30 pm | Conference Dinner |
Day 2 | |
---|---|
8:00 - 9:00 am | Breakfast |
9:00 - 10:00 am | Keynote 2: Unveiling Security Engine's Time Machine: A Journey Through History and a Look into the Future -- Prof. Farimah Farahmandi, University of Florida |
10:00 - 10:30 am | Break |
10:30 - 11:50 am |
Session 4: Crypto Hardware and Accelerations
|
CiFHER: A Chiplet-Based FHE Accelerator with a Resizable Structure.
Sangpyo Kim, Jongmin Kim, Jae Young Choi, Jung Ho Ahn (Seoul National University).
| |
LOaPP: Improving the performance of Persistent Memory Objects via Low-Overhead at-rest PMO Protection.
Derrick Greenspan, Naveed Ul Mustafa, Andres Delgado, Connor Bramham, Christopher Prats, Samu Wallace, Mark Heinrich, Yan Solihin (University of Central Florida).
|
|
SoK: Opportunities for Accelerating Multi-Party Computation via Trusted Hardware.
Tong Liu (Southern University of Science and Technology), Zhen Huang (Shanghai Jiao Tong University), Jiaao Li (Tsinghua University), Jianyu Niu (Southern University of Science and Technology), Guoxing Chen (Shanghai Jiao Tong University), Yinqian Zhang (Southern University of Science and Technology).
| |
Aggregate Encryption Individual Decryption for FPGA Bitstream Protection on Cloud.
Mukta Debnath (Indian Statistical Institute Kolkata), Krishnendu Guha (University College Cork), Debasri Saha (University of Calcutta), Susmita Sur-Kolay (Indian Statistical Institute Kolkata).
| |
12:00 - 1:00 pm | Lunch and Closing |