-
W41 - Automating Hardware Security Property Generation
Online Presentations | 26 Jul 2023 | Contributor(s): Ryan Kastner | 5 users
This talk describes a series of automated techniques to help generate security properties. Our initial goal aims to provide insights into the designs that can be used to help derive properties. Our ambitious long-term goal is to automate the security property generation process using limited...
-
W12 - Asynchronous Design: Responsible Use
Online Presentations | 20 May 2024 | Contributor(s): William Koven | 18 users
This webinar will provide an overview of the most common asynchronous design techniques and their Power, Performance, Area, and Security (PPAS) tradeoffs with a focus on information leakage. This webinar will conclude with recommendations on when certain asynchronous approaches may be...
-
W02 - Protecting Electronics Supply Chain Throughout Lifecycle
Online Presentations | 20 May 2024 | Contributor(s): Mark Tehranipoor | 11 users
In this webinar, we will present complementary techniques to provide an end-to-end solution to protecting electronic supply chain.
-
W24 - Towards Secure High-Performance Computer Architectures
Online Presentations | 20 May 2024 | Contributor(s): Srini Devadas | 31 users
The objective of this webinar is to demystify this field and provide in-depth understanding of the different transformations that occur in each design step, and how these transformations can affect the final performance metrics. The webinar will focus on FPGAs as the target technology.
-
W59 - Security and Privacy for Augmented Reality/Virtual Reality Systems: Attacks and Threat Models
Online Presentations | 18 Aug 2024 | Contributor(s): Nael Abu-Ghazaleh | 6 users
AR/VR devices promise a new era of immersive computing, where our every day experience is augmented with helpful information (Augmented Reality), or where we are immersed in fully virtual worlds (Virtual Reality). These systems fuse the physical world, and the virtual world, through...
-
W01 - The Art Of Digital Design Using Field-Programmable Gate Arrays (FPGAs)
Online Presentations | 29 Aug 2024 | Contributor(s): Eslam Yahya Tawfik | 9 users
This webinar will focus on fundamental elements in the design process, including HDL modeling, event‑driven simulation, synthesis, timing analysis, and FPGA architecture.
-
W60 - Introduction to Systems-on-Chip: Concepts, Architecture, Challenges and Opportunities
Online Presentations | 30 Aug 2024 | Contributor(s): Christophe Bobda | 16 users
This lecture will first introduce SoCs, discuss the opportunities and challenges, and explore the architecture. This is an introductory course on SoC that will conclude with the design and implementation of a basic SoC on an FPGA.
-
W23 - Hardware Security Primitives: Recent Advancements
Online Presentations | 29 Aug 2024 | Contributor(s): Fahim Rahman | 1 user
Your feedback matters! Help us gain a better understanding of your learning experience. We invite you to complete the following 3-question survey prior to watching this webinar, and complete the following short survey after watching. Thank you.To see the schedule for upcoming live webinars please...
-
W54 - Navigating the Confluence: Leverage AI, Confidential Computing, and Heterogeneous Integration
Online Presentations | 29 Aug 2024 | Contributor(s): Sazadur Rahman | 3 users
Generative design, powered by artificial intelligence (AI) and machine learning, revolutionizes engineering processes. It automates topology optimization, simulation, and concept generation. Things that were once manual and labor intensive are now becoming feasible by AI adapting designs to...
-
W55 - New Frontiers of Hardware Security in the IoT Regime
Online Presentations | 29 Aug 2024 | Contributor(s): Swarup Bhunia
The talk will cover spectrum of challenges associated with IoT security and describe emerging solutions in creating secure trustworthy hardware that can enable IoT security for the mass. It will outline the need and challenges for verification of electronic designs for security properties and...
-
W56 - Applying Physical Inspection for Achieving Microelectronics Assurance
Online Presentations | 29 Aug 2024 | Contributor(s): Adam Kimura | 3 users
This presentation will look at some of the foundational methods of physical inspection used for achieving post-silicon assurance in microelectronics. It will cover the tools and processes that are used as well as discuss the challenges that remain for researchers to address.
-
W57 - Unlocking the Potential of Impedance Side-Channel: Expanding Horizons in Hardware Security and Privacy
Online Presentations | 29 Aug 2024 | Contributor(s): Md. Tauhidur Rahman | 1 user
In this talk, I will explore the emerging role of the impedance side channel in security and privacy, similar to other established side channels such as power and electromagnetics. ...
-
W58 - Firmware Frontiers: Tackling IoT Security from Bare-Metal to BusyBox
Online Presentations | 29 Aug 2024 | Contributor(s): Houman Homayoun | 1 user
This talk will delve into the security challenges and cutting-edge solutions pertinent to the firmware of IoT systems, presenting our latest findings from research published in recent NDSS and USENIX security conferences. Our studies focus on two types of firmware vulnerabilities: those in...
-
W52 - Security of Quantum Computer Architectures and Hardware
Online Presentations | 20 Sep 2024 | Contributor(s): Jakub S. | 9 users
The focus of the seminar will be on superconducting qubit quantum computers, however, the security ideas can be applied to other types of quantum computers....
-
W51 - Tracking and Tracing Microchips: From Wafer, to Die, to Package
Online Presentations | 03 Sep 2024 | Contributor(s): Naresh Menon | 4 users
We will discuss case studies and show that full traceability without additive markings is not only possible but when implemented, can significantly improve the bottomline.
-
W50 - Enabling Pre-silicon Security Sign-off with ML-augmented Multiphysics Simulation
Online Presentations | 03 Sep 2024 | Contributor(s): Norman Chang | 1 user
In this talk, we will cover RTL power, electromagnetic, and thermal side-channel analysis with ML-augmented techniques as proof-of-concept for comprehensive pre-silicon security signoff.
-
W49 - Leveraging the Defense Technical Information Center (DTIC) to Advance Microelectronic Technologies and Research
Online Presentations | 03 Sep 2024 | Contributor(s): Ryan Makinson
This webinar will cover how to best leverage DTIC’s resources and services to advance microelectronic technologies and research. ...
-
W48 - Hardware Security: Functional Encryption and Chip Authentication
Online Presentations | 03 Sep 2024 | Contributor(s): Keshab K. Parhi
This talk will present approaches to functional obfuscation where the functionality is hidden by incorporating keys to a design such that the circuit only functions correctly if the key is correct. Various modes are introduced such that only the correct key triggers the correct functionality of...
-
W47 - Fault Criticality Assessment in AI Accelerators
Online Presentations | 03 Sep 2024 | Contributor(s): Krishnendu Chakrabarty
This presentation presents a neural-twin framework for analyzing fault criticality with a negligible amount of ground-truth data. A recently proposed misclassification-driven training algorithm will be used to sensitize and identify biases that are critical to the functioning of the accelerator...
-
W46 - DisruptNet: Integrity Breach of Deep Neural Network Execution
Online Presentations | 03 Sep 2024 | Contributor(s): Yunsi Fei | 1 user
This talk focuses on several new active attacks of deep learning accelerators on different platforms, FPGA and GPU, resulting in image misclassification and integrity breach of deep neural network execution. Our new vector of attacks are first of their kind and reveal a largely under-explored...
-
W45 - IP Protection through Logic Locking: What to Expect From the State-of-the-art Techniques
Online Presentations | 03 Sep 2024 | Contributor(s): Hadi Mardani Kamali, Kimia Zamiri Azar | 3 users
This presentation, by elaborating the principals and fundamentals of logic locking, will draw a holistic demonstration of state-of-the-art, in both defensive and attacking sides. This presentation also covers and evaluates current trends in logic locking with the possible changes in threat...
-
W44 - Securing Neural Networks Against Side-Channel Attacks with Hardware Masking
Online Presentations | 03 Sep 2024 | Contributor(s): Aydin Aysu | 1 user
In this talk, I will explain different mechanisms to mask neural networks in hardware and describe related opportunities and challenges. I will first discuss how a straightforward masking adaptation leaks side-channel information on neural networks and how to address this...
-
W43 - Efficient and Reliable Deep Learning at Scale: Hardware and Software
Online Presentations | 04 Sep 2024 | Contributor(s): Yiran Chen | 1 user
This talk discusses the importance of hardware/software co-design in the development of AI computing systems. We first use resistive memory based Neural Network (NN) accelerators to illustrate the design philosophy of heterogeneous AI computing systems, and then present several...
-
W42 - Security Attacks and Defenses of the Micro-Op Cache and the Processor Frontend
Online Presentations | 04 Sep 2024 | Contributor(s): Jakub S., Shuwen Deng
This seminar aims to give an up-to-date and concise introduction to the processor frontend and the security issues it brings about. The root causes of the security threats are the multiple paths in the processor frontend that the micro-ops can take while being decoded: through the MITE, DSB ....
-
W40 - Toward Agile and Open Electronic Design Automation
Online Presentations | 04 Sep 2024 | Contributor(s): David Pan
This talk will present some recent trends and efforts toward agile and open electronic design automation (EDA), in particular leveraging AI/machine learning with domain-specific customizations. I will first show how we leverage deep learning hardware and software to develop an open-source VLSI...
-
W39 - Interview: Serge Leef (DARPA)
Online Presentations | 04 Sep 2024 | Contributor(s): Serge Leef
Serge Leef, Design Automation and Hardware Security Program Manager at DARPA, talks to Dr. Mark Tehranipoor, Director of FICS Research, about microelectronics security.
-
W38 - Interview: Dr. Wally Rhines (Cornami, Inc.)
Online Presentations | 04 Sep 2024 | Contributor(s): Wally Rhines
Dr. Mark Tehranipoor, Director of FICS Research at the University of Florida, sits down virtually with Dr. Wally Rhines, CEO of Cornami, to have a chat about popular topics in the semiconductor industry and hardware security.
-
W37 - Towards Resilient Approaches for Detecting Recycled ICs
Online Presentations | 04 Sep 2024 | Contributor(s): Ujjwal Guin | 2 users
Your feedback matters! Help us gain a better understanding of your learning experience. We invite you to complete the following 3-question survey prior to watching this webinar, and complete the following short survey after watching. Thank you. The recycling of integrated circuits (ICs) has...
-
W36 - Hardware Based Attacks and Solutions on Proprietary Deep Learning Models
Online Presentations | 04 Sep 2024 | Contributor(s): Ankur Srivastava | 3 users
Deep learning (DL) algorithms are extensively used for analyzing big data in several domains including image classification, natural language processing, autonomous transportation, smart health, financial management, social networks, etc..
-
W35 - Recent Advances in Electro-Magnetic Hardware Security and Physical-layer Generic Countermeasures
Online Presentations | 04 Sep 2024 | Contributor(s): Shreyas Sen | 1 user
In this talk, we will cover the following topics in EM/Power Side-Channel Attacks and Countermeasures (a) Threats and impacts of physical side-channels (b) In-depth analysis of power side-channel and low-overhead generic power-side channel countermeasure through attenuated signature noise...
-
W34 - Toward Developing Secure and Privacy-Enhancing Systems: A Retrospection, A Look Ahead
Online Presentations | 04 Sep 2024 | Contributor(s): Rosario Cammarota
In this talk, I will share both lessons learned and a look ahead on the development of computing platforms for enabling and sustaining the benefits promised by data digitization, sharing and collaboration, while protecting regulatory and privacy concerns.
-
W32 - Toward Durable System Security
Online Presentations | 04 Sep 2024 | Contributor(s): Todd Austin | 7 users
In this talk, I’ll dive into why today’s system security technologies are not very durable and share with you our work toward more durable security defenses. First, I’ll detail the Morpheus secure RISC-V CPU, which successfully fended off all attacks from 535 cybersecurity...
-
W31 - Security, FPGAs, and the Cloud: Fundamentals of FPGA-Accelerated Cloud Security
Online Presentations | 04 Sep 2024 | Contributor(s): Jakub S.
The talk will cover recent research on thermal channels that can be used to create covert channels between users renting same FPGA over time, FPGA fingerprinting and reverse-engineering FPGA-enabled data center infrastructures, and voltage-based channels can be used to leak sensitive...
-
W30 - Thinking of Logic Locking? Be Aware of the Existing Attacks!
Online Presentations | 04 Sep 2024 | Contributor(s): Avesta Sasan | 1 user
In this presentation, we will review many of these attacks and discuss the state of the art attacks that logic encryption solutions have to resist. The goal of this talk is to raise awareness about the capabilities of adversaries and existing solutions for attacking and decrypting logic...
-
W29 - Practical Security SoC Design Considerations: Making the Transition from the Lab to the Fab
Online Presentations | 11 Sep 2024 | Contributor(s): Mike Borza
Participants in this presentation should gain an understanding of some of the challenges and solution approaches to developing secure IC products for volume manufacturing.
-
W28 - SPARTA-COTS A Laser Probing Approach for Sequential Trojan Detection in COTS Integrated Circuits
Online Presentations | 11 Sep 2024 | Contributor(s): Andrew Stern
Your feedback matters! Help us gain a better understanding of your learning experience. We invite you to complete the following 3-question survey prior to watching this webinar, and complete the following short survey after watching. Thank you.To see the schedule for upcoming live webinars please...
-
W27 - Contactless Optical Probing on Integrated Circuits
Online Presentations | 11 Sep 2024 | Contributor(s): Navid Asadi=Zanjani | 1 user
In this presentation we will assess the security vulnerabilities in modern integrated circuits (ICs) against contactless optical probing. The basics and the principle of optical probing physics and its various modalities will be presented first. A case study will be presented then using the...
-
W26 - Integrated Circuit Design Redaction through Transistor-Level Programming
Online Presentations | 11 Sep 2024 | Contributor(s): Yiorgos Makris
In this presentation we will discuss the design of the latest version of our TRAP fabric, the CAD tool-flow necessary for supporting such hybrid designs ASIC/Programmable ICs, and the protection that TRAP-based design redaction offers against both brute-force and intelligent attacks seeking to...
-
W25 - Machine Learning on Encrypted Data: Hardware to the Rescue
Online Presentations | 11 Sep 2024 | Contributor(s): Farinaz Koushanfar | 1 user
This talk highlights the crucial role of hardware and advances in computing architecture in supporting the recent progresses in the field. I outline the main technologies and mixed computing models. I particularly center my talk on the recent progress in synthesis of Garbled Circuits ...
-
W22 - Logic Locking for Chip Design Protection: Lessons Learnt, Metrics, and Trade-offs
Online Presentations | 11 Sep 2024 | Contributor(s): Ozgur Sinanoglu
This presentation elaborates on the threats such as reverse engineering, piracy and IC overbuilding that the chip design industry is up against, while describing a design-for-trust solution that has been developed over the last decade, called logic locking, to protect chip designs from these...
-
W21 - Closing Information Leakage Channels in Microarchitecture
Online Presentations | 11 Sep 2024 | Contributor(s): Guru Venkataramani
In this talk, we will first visit the fundamental problems surrounding sensitive information leakage that dominate security research landscape and has the potential to hamper upcoming applications. More recently, timing channels have emerged ...
-
W20 - Counterfeit Detection: Electrical/Logical Test Techniques
Online Presentations | 11 Sep 2024 | Contributor(s): Dominic Forte | 2 users
In this presentation, we will cover (i) Counterfeit electronic part sources and motivation; (ii) Counterfeit IC type, defect, and detection taxonomies; (iii) Basic parametric/functional tests; (iv) More advanced detection approaches that target counterfeit processors, memories, and FPGAs; ...
-
W19 - Side Channel
Online Presentations | 11 Sep 2024 | Contributor(s): Katie Liszewski
We present an introduction to side channel analysis and interactive tutorial. The lecture starts with a light introduction to cryptographic implementations and leakage models. We then discuss basic experimental setup for power analysis and contrast power and EM ...
-
W18 - Side-Channel Leakage Assessment of Cryptographic Modules
Online Presentations | 11 Sep 2024 | Contributor(s): Jungmin Park
In this talk, Dr. Park will introduce how to analyze and quantify side-channel leakage information at various design stages such as RTL, gate level and post-silicon level. Based on these analysis, most vulnerable modules will be searched and replaced with secure modules.
-
W17 - A New Approach to Measure Hardware Security Coverage
Online Presentations | 11 Sep 2024 | Contributor(s): Jason Oberg | 2 users
This presentation will describe important industry initiatives supported by MITRE that can be effectively leveraged for measuring security coverage against common hardware weaknesses. Additionally, it will discuss innovative technical solutions that allow ...
-
W16 - Asynchronous Circuit Design for Reliability and Security
Online Presentations | 11 Sep 2024 | Contributor(s): Jia Di | 1 user
Invented back in 1950’s, asynchronous circuits have not been developing nearly as fast as their clocked, synchronous counterparts. While the synchronous design paradigm dominates the current digital IC market, there are many applications for which asynchronous circuits have unmatched...
-
W15 - Blockchain for Electronic Supply Chain, Part II
Online Presentations | 11 Sep 2024 | Contributor(s): Jason Vosatka
The goal of this webinar is to learn and understand how to protect the electronics supply chain through trustworthy tracking and non-destructive verification of electronic components. Details of establishing a consortium-style blockchain infrastructure are covered ...
-
W14 - Machine Learning in Silicon Data Analytics
Online Presentations | 11 Sep 2024 | Contributor(s): Li-C Wang | 1 user
This presentation discusses the key ideas for implementing such an end-to-end data analytics solution, and demonstrates its usage in silicon data analytics based on data from actual semiconductor chip product lines.
-
W13 - System-Level Design of Secured System-on-Chips
Online Presentations | 10 Sep 2024 | Contributor(s): Christophe Bobda
This presentation addresses system-level-design of secured system-on-chips through a tighter integration of user-specified security requirements and objectives in the hardware/software design process. ...
-
W11 - Computer Vision for HW Security
Online Presentations | 10 Sep 2024 | Contributor(s): Damon Woodard | 1 user
This presentation will first provide an overview of computer vision and conventional methods that have been applied to hardware security problems. Also, a detailed discussion of two examples of computer vision-enabled hardware security applications, automated hardware trojan detection ...
-
W10 - Panel Discussion: State of the Microelectronics Design and Security
Online Presentations | 11 Sep 2024 | Contributor(s): Matthew Casto, Greg Creech, Serge Leef
This panel intends to keep the microelectronics design and security community up to date on the status of existing initiatives, new initiatives, and discuss new ideas to pursue collaboration between government, industry, and academia both in research and workforce development.
-
W09 - Security and Forensics in the IoT Era: From Reverse Engineering to HoneyIoT
Online Presentations | 10 Sep 2024 | Contributor(s): Yier Jin
This presentation will first introduce the emerging security and privacy challenges in the IoT domain. Then focus on the bottom-up solutions on IoT protection and will present our recent research effort in microarchitecture supported IoT runtime attack detection and device attestation. ...
-
W08 - Blockchain for Electronics Supply Chain Integrity. Part I
Online Presentations | 10 Sep 2024 | Contributor(s): Fahim Rahman
The goal of this presentation is to understand and learn threats and vulnerabilities introduced in current electronic supply chain; emerging blockchain and distributed ledger framework targeted for data integrity, techniques for developing blockchain-based framework ...
-
W07 - Architecture Level Vulnerabilities
Online Presentations | 10 Sep 2024 | Contributor(s): Radu Teodorescu | 1 user
This presentation introduces the newly discovered transient execution attacks that exploit various forms of speculation employed in modern processors. We discuss the architectural design features that have enabled these attacks, outline some of the software patches ...
-
W06 - Why CAD/Automation is Needed for HW Security
Online Presentations | 10 Sep 2024 | Contributor(s): Farimah Farahmandi | 1 user
The goal of this webinar is to present vulnerabilities introduced during various stages of design life-cycle, CAD tools and methodologies for security assessment and detecting security vulnerabilities, countermeasure tools and methodologies ...
-
W05 - Hardware Security Verification Using Formal Methods
Online Presentations | 11 Sep 2024 | Contributor(s): Prabhat Mishra
Your feedback matters! Help us gain a better understanding of your learning experience. We invite you to complete the following 3-question survey prior to watching this webinar, and complete the following short survey after watching. Thank you.To see the schedule for upcoming live webinars please...
-
W04 - Physical Assurance and Inspection of Electronics
Online Presentations | 11 Sep 2024 | Contributor(s): Navid Asadi=Zanjani
This talk will focus on the state-of-the-art physical inspection/assurance methods, the existing countermeasures, related challenges to develop new countermeasures and a research roadmap for this emerging field.
-
W03 - Introduction to Hardware Obfuscation
Online Presentations | 10 Sep 2024 | Contributor(s): Dominic Forte | 1 user
In this presentation, the following topics will be covered: (1) Overview of the IC design flow and threat models; (2) Summary of naïve protection approaches and their limitations; (3) Introduction to hardware obfuscation variants, applications/use cases, popular metrics, and other...
-
W61 - Applications of Embedded, High-Resolution On-Chip Instrumentation for Hardware Security and Trust
Online Presentations | 27 Sep 2024 | Contributor(s): Jim Plusquellic | 8 users
In this talk, I describe several novel hardware security primitives, called physical unclonable functions (PUFs), which leverage EI to obtain high-resolution path delays and voltage drops, as well as techniques that calibrate for adverse environmental effects and undesirable sources of process...
-
W62 - Harnessing the Power of LLMs in Semiconductor Test Data Analytics
Online Presentations | 29 Oct 2024 | Contributor(s): Li-C Wang
We introduce a novel paradigm, Decision-Support ML (DSML), and explain its implementation in common test data analytics workflows. Using wafermap analytics as a case study, we demonstrate how we built IEA-Plot, an LLM-assisted AI solution...