MEST Webinar Seminar Series

Category

Series

Published on

Abstract

Your feedback matters! Help us gain a better understanding of your learning experience. We invite you to complete the following 3-question survey prior to watching before viewing one of the webinars, and complete the following short survey after watching. Thank you.

To see the schedule for upcoming live webinars please visit the MEST Webinar Calendar.

The webinar archive can also be found at the online course MEST Webinar Seminar Series. Enrollment is free and unrestricted. Once enrolled you will be able to view all past webinars.

Sponsored by

Cite this work

Researchers should cite this work as follows:

  • (2024), "MEST Webinar Seminar Series," https://nanohub.org/resources/39015.

    BibTex | EndNote

Tags

In This Series

  1. W41 - Automating Hardware Security Property Generation

    Online Presentations | 26 Jul 2023 | Contributor(s): Ryan Kastner | 5 users

    This talk describes a series of automated techniques to help generate security properties. Our initial goal aims to provide insights into the designs that can be used to help derive properties. Our ambitious long-term goal is to automate the security property generation process using limited...

  2. W12 - Asynchronous Design: Responsible Use

    Online Presentations | 20 May 2024 | Contributor(s): William Koven | 18 users

    This webinar will provide an overview of the most common asynchronous design techniques and their Power, Performance, Area, and Security (PPAS) tradeoffs with a focus on information leakage. This webinar will conclude with recommendations on when certain asynchronous approaches may be...

  3. W02 - Protecting Electronics Supply Chain Throughout Lifecycle

    Online Presentations | 20 May 2024 | Contributor(s): Mark Tehranipoor | 11 users

    In this webinar, we will present complementary techniques to provide an end-to-end solution to protecting electronic supply chain.

  4. W24 - Towards Secure High-Performance Computer Architectures

    Online Presentations | 20 May 2024 | Contributor(s): Srini Devadas | 31 users

    The objective of this webinar is to demystify this field and provide in-depth understanding of the different transformations that occur in each design step, and how these transformations can affect the final performance metrics. The webinar will focus on FPGAs as the target technology.

  5. W59 - Security and Privacy for Augmented Reality/Virtual Reality Systems: Attacks and Threat Models

    Online Presentations | 18 Aug 2024 | Contributor(s): Nael Abu-Ghazaleh | 6 users

    AR/VR devices promise a new era of immersive computing, where our every day experience is augmented with helpful information (Augmented Reality), or where we are immersed in fully virtual worlds (Virtual Reality).  These systems fuse the physical world, and the virtual world, through...

  6. W01 - The Art Of Digital Design Using Field-Programmable Gate Arrays (FPGAs)

    Online Presentations | 29 Aug 2024 | Contributor(s): Eslam Yahya Tawfik | 9 users

    This webinar will focus on fundamental elements in the design process, including HDL modeling, event‑driven simulation, synthesis, timing analysis, and FPGA architecture.

  7. W60 - Introduction to Systems-on-Chip: Concepts, Architecture, Challenges and Opportunities 

    Online Presentations | 30 Aug 2024 | Contributor(s): Christophe Bobda | 16 users

    This lecture will first introduce SoCs, discuss the opportunities and challenges, and explore the architecture. This is an introductory course on SoC that will conclude with the design and implementation of a basic SoC on an FPGA. 

  8. W23 - Hardware Security Primitives: Recent Advancements

    Online Presentations | 29 Aug 2024 | Contributor(s): Fahim Rahman | 1 user

    Your feedback matters! Help us gain a better understanding of your learning experience. We invite you to complete the following 3-question survey prior to watching this webinar, and complete the following short survey after watching. Thank you.To see the schedule for upcoming live webinars please...

  9. W54 - Navigating the Confluence: Leverage AI, Confidential Computing, and Heterogeneous Integration

    Online Presentations | 29 Aug 2024 | Contributor(s): Sazadur Rahman | 3 users

    Generative design, powered by artificial intelligence (AI) and machine learning, revolutionizes engineering processes. It automates topology optimization, simulation, and concept generation. Things that were once manual and labor intensive are now becoming feasible by AI adapting designs to...

  10. W55 - New Frontiers of Hardware Security in the IoT Regime

    Online Presentations | 29 Aug 2024 | Contributor(s): Swarup Bhunia

    The talk will cover spectrum of challenges associated with IoT security and describe emerging solutions in creating secure trustworthy hardware that can enable IoT security for the mass. It will outline the need and challenges for verification of electronic designs for security properties and...

  11. W56 - Applying Physical Inspection for Achieving Microelectronics Assurance

    Online Presentations | 29 Aug 2024 | Contributor(s): Adam Kimura | 3 users

    This presentation will look at some of the foundational methods of physical inspection used for achieving post-silicon assurance in microelectronics.  It will cover the tools and processes that are used as well as discuss the challenges that remain for researchers to address.

  12. W57 - Unlocking the Potential of Impedance Side-Channel: Expanding Horizons in Hardware Security and Privacy

    Online Presentations | 29 Aug 2024 | Contributor(s): Md. Tauhidur Rahman | 1 user

    In this talk,  I will explore the emerging role of the impedance side channel in security and privacy, similar to other established side channels such as power and electromagnetics. ...

  13. W58 - Firmware Frontiers: Tackling IoT Security from Bare-Metal to BusyBox

    Online Presentations | 29 Aug 2024 | Contributor(s): Houman Homayoun | 1 user

    This talk will delve into the security challenges and cutting-edge solutions pertinent to the firmware of IoT systems, presenting our latest findings from research published in recent NDSS and USENIX security conferences. Our studies focus on two types of firmware vulnerabilities: those in...

  14. W52 - Security of Quantum Computer Architectures and Hardware

    Online Presentations | 20 Sep 2024 | Contributor(s): Jakub S. | 9 users

    The focus of the seminar will be on superconducting qubit quantum computers, however, the security ideas can be applied to other types of quantum computers....

  15. W51 - Tracking and Tracing Microchips: From Wafer, to Die, to Package

    Online Presentations | 03 Sep 2024 | Contributor(s): Naresh Menon | 4 users

    We will discuss case studies and show that full traceability without additive markings is not only possible but when implemented, can significantly improve the bottomline.

  16. W50 - Enabling Pre-silicon Security Sign-off with ML-augmented Multiphysics Simulation

    Online Presentations | 03 Sep 2024 | Contributor(s): Norman Chang | 1 user

    In this talk, we will cover RTL power, electromagnetic, and thermal side-channel analysis with ML-augmented techniques as proof-of-concept for comprehensive pre-silicon security signoff.

  17. W49 - Leveraging the Defense Technical Information Center (DTIC) to Advance Microelectronic Technologies and Research

    Online Presentations | 03 Sep 2024 | Contributor(s): Ryan Makinson

    This webinar will cover how to best leverage DTIC’s resources and services to advance microelectronic technologies and research. ...

  18. W48 - Hardware Security: Functional Encryption and Chip Authentication

    Online Presentations | 03 Sep 2024 | Contributor(s): Keshab K. Parhi

    This talk will present approaches to functional obfuscation where the functionality is hidden by incorporating keys to a design such that the circuit only functions correctly if the key is correct. Various modes are introduced such that only the correct key triggers the correct functionality of...

  19. W47 - Fault Criticality Assessment in AI Accelerators

    Online Presentations | 03 Sep 2024 | Contributor(s): Krishnendu Chakrabarty

    This presentation presents a neural-twin framework for analyzing fault criticality with a negligible amount of ground-truth data. A recently proposed misclassification-driven training algorithm will be used to sensitize and identify biases that are critical to the functioning of the accelerator...

  20. W46 - DisruptNet: Integrity Breach of Deep Neural Network Execution

    Online Presentations | 03 Sep 2024 | Contributor(s): Yunsi Fei | 1 user

    This talk focuses on several new active attacks of deep learning accelerators on different platforms, FPGA and GPU, resulting in image misclassification and integrity breach of deep neural network execution. Our new vector of attacks are first of their kind and reveal a largely under-explored...

  21. W45 - IP Protection through Logic Locking: What to Expect From the State-of-the-art Techniques

    Online Presentations | 03 Sep 2024 | Contributor(s): Hadi Mardani Kamali, Kimia Zamiri Azar | 3 users

    This presentation, by elaborating the principals and fundamentals of logic locking, will draw a holistic demonstration of state-of-the-art, in both defensive and attacking sides. This presentation also covers and evaluates current trends in logic locking with the possible changes in threat...

  22. W44 - Securing Neural Networks Against Side-Channel Attacks with Hardware Masking

    Online Presentations | 03 Sep 2024 | Contributor(s): Aydin Aysu | 1 user

    In this talk, I will explain different mechanisms to mask neural networks in hardware and describe related opportunities and challenges.  I will first discuss how a straightforward masking adaptation leaks side-channel information on neural networks and how to address this...

  23. W43 - Efficient and Reliable Deep Learning at Scale: Hardware and Software

    Online Presentations | 04 Sep 2024 | Contributor(s): Yiran Chen | 1 user

    This talk discusses the importance of hardware/software co-design in the development of AI computing systems. We first use resistive memory based Neural Network (NN) accelerators to illustrate the design philosophy of heterogeneous AI computing systems, and then present several...

  24. W42 - Security Attacks and Defenses of the Micro-Op Cache and the Processor Frontend

    Online Presentations | 04 Sep 2024 | Contributor(s): Jakub S., Shuwen Deng

    This seminar aims to give an up-to-date and concise introduction to the processor frontend and the security issues it brings about. The root causes of the security threats are the multiple paths in the processor frontend that the micro-ops can take while being decoded: through the MITE, DSB ....

  25. W40 - Toward Agile and Open Electronic Design Automation

    Online Presentations | 04 Sep 2024 | Contributor(s): David Pan

    This talk will present some recent trends and efforts toward agile and open electronic design automation (EDA), in particular leveraging AI/machine learning with domain-specific customizations. I will first show how we leverage deep learning hardware and software to develop an open-source VLSI...

  26. W39 - Interview: Serge Leef (DARPA)

    Online Presentations | 04 Sep 2024 | Contributor(s): Serge Leef

    Serge Leef, Design Automation and Hardware Security Program Manager at DARPA, talks to Dr. Mark Tehranipoor, Director of FICS Research, about microelectronics security.

  27. W38 - Interview: Dr. Wally Rhines (Cornami, Inc.)

    Online Presentations | 04 Sep 2024 | Contributor(s): Wally Rhines

    Dr. Mark Tehranipoor, Director of FICS Research at the University of Florida, sits down virtually with Dr. Wally Rhines, CEO of Cornami, to have a chat about popular topics in the semiconductor industry and hardware security.

  28. W37 - Towards Resilient Approaches for Detecting Recycled ICs

    Online Presentations | 04 Sep 2024 | Contributor(s): Ujjwal Guin | 2 users

    Your feedback matters! Help us gain a better understanding of your learning experience. We invite you to complete the following 3-question survey prior to watching this webinar, and complete the following short survey after watching. Thank you. The recycling of integrated circuits (ICs) has...

  29. W36 - Hardware Based Attacks and Solutions on Proprietary Deep Learning Models

    Online Presentations | 04 Sep 2024 | Contributor(s): Ankur Srivastava | 3 users

    Deep learning (DL) algorithms are extensively used for analyzing big data in several domains including image classification, natural language processing, autonomous transportation, smart health, financial management, social networks, etc..

  30. W35 - Recent Advances in Electro-Magnetic Hardware Security and Physical-layer Generic Countermeasures

    Online Presentations | 04 Sep 2024 | Contributor(s): Shreyas Sen | 1 user

    In this talk, we will cover the following topics in EM/Power Side-Channel Attacks and Countermeasures (a) Threats and impacts of physical side-channels (b) In-depth analysis of power side-channel and low-overhead generic power-side channel countermeasure through attenuated signature noise...

  31. W34 - Toward Developing Secure and Privacy-Enhancing Systems: A Retrospection, A Look Ahead

    Online Presentations | 04 Sep 2024 | Contributor(s): Rosario Cammarota

    In this talk, I will share both lessons learned and a look ahead on the development of computing platforms for enabling and sustaining the benefits promised by data digitization, sharing and collaboration, while protecting regulatory and privacy concerns.

  32. W32 - Toward Durable System Security

    Online Presentations | 04 Sep 2024 | Contributor(s): Todd Austin | 7 users

    In this talk, I’ll dive into why today’s system security technologies are not very durable and share with you our work toward more durable security defenses. First, I’ll detail the Morpheus secure RISC-V CPU, which successfully fended off all attacks from 535 cybersecurity...

  33. W31 - Security, FPGAs, and the Cloud: Fundamentals of FPGA-Accelerated Cloud Security

    Online Presentations | 04 Sep 2024 | Contributor(s): Jakub S.

    The talk will cover recent research on thermal channels that can be used to create covert channels between users renting same FPGA over time, FPGA fingerprinting and reverse-engineering FPGA-enabled data center infrastructures, and voltage-based channels can be used to leak sensitive...

  34. W30 - Thinking of Logic Locking? Be Aware of the Existing Attacks!

    Online Presentations | 04 Sep 2024 | Contributor(s): Avesta Sasan | 1 user

    In this presentation, we will review many of these attacks and discuss the state of the art attacks that logic encryption solutions have to resist. The goal of this talk is to raise awareness about the capabilities of adversaries and existing solutions for attacking and decrypting logic...

  35. W29 - Practical Security SoC Design Considerations: Making the Transition from the Lab to the Fab

    Online Presentations | 11 Sep 2024 | Contributor(s): Mike Borza

    Participants in this presentation should gain an understanding of some of the challenges and solution approaches to developing secure IC products for volume manufacturing.

  36. W28 - SPARTA-COTS A Laser Probing Approach for Sequential Trojan Detection in COTS Integrated Circuits

    Online Presentations | 11 Sep 2024 | Contributor(s): Andrew Stern

    Your feedback matters! Help us gain a better understanding of your learning experience. We invite you to complete the following 3-question survey prior to watching this webinar, and complete the following short survey after watching. Thank you.To see the schedule for upcoming live webinars please...

  37. W27 - Contactless Optical Probing on Integrated Circuits

    Online Presentations | 11 Sep 2024 | Contributor(s): Navid Asadi=Zanjani | 1 user

    In this presentation we will assess the security vulnerabilities in modern integrated circuits (ICs) against contactless optical probing. The basics and the principle of optical probing physics and its various modalities will be presented first. A case study will be presented then using the...

  38. W26 - Integrated Circuit Design Redaction through Transistor-Level Programming

    Online Presentations | 11 Sep 2024 | Contributor(s): Yiorgos Makris

    In this presentation we will discuss the design of the latest version of our TRAP fabric, the CAD tool-flow necessary for supporting such hybrid designs ASIC/Programmable ICs, and the protection that TRAP-based design redaction offers against both brute-force and intelligent attacks seeking to...

  39. W25 - Machine Learning on Encrypted Data: Hardware to the Rescue

    Online Presentations | 11 Sep 2024 | Contributor(s): Farinaz Koushanfar | 1 user

    This talk highlights the crucial role of hardware and advances in computing architecture in supporting the recent progresses in the field. I outline the main technologies and mixed computing models. I particularly center my talk on the recent progress in synthesis of Garbled Circuits ...

  40. W22 - Logic Locking for Chip Design Protection: Lessons Learnt, Metrics, and Trade-offs

    Online Presentations | 11 Sep 2024 | Contributor(s): Ozgur Sinanoglu

    This presentation elaborates on the threats such as reverse engineering, piracy and IC overbuilding that the chip design industry is up against, while describing a design-for-trust solution that has been developed over the last decade, called logic locking, to protect chip designs from these...

  41. W21 - Closing Information Leakage Channels in Microarchitecture

    Online Presentations | 11 Sep 2024 | Contributor(s): Guru Venkataramani

    In this talk, we will first visit the fundamental problems surrounding sensitive information leakage that dominate security research landscape and has the potential to hamper upcoming applications. More recently, timing channels have emerged ...

  42. W20 - Counterfeit Detection: Electrical/Logical Test Techniques

    Online Presentations | 11 Sep 2024 | Contributor(s): Dominic Forte | 2 users

    In this presentation, we will cover (i) Counterfeit electronic part sources and motivation; (ii) Counterfeit IC type, defect, and detection taxonomies; (iii) Basic parametric/functional tests; (iv) More advanced detection approaches that target counterfeit processors, memories, and FPGAs; ...

  43. W19 - Side Channel

    Online Presentations | 11 Sep 2024 | Contributor(s): Katie Liszewski

    We present an introduction to side channel analysis and interactive tutorial. The lecture starts with a light introduction to cryptographic implementations and leakage models. We then discuss basic experimental setup for power analysis and contrast power and EM ...

  44. W18 - Side-Channel Leakage Assessment of Cryptographic Modules

    Online Presentations | 11 Sep 2024 | Contributor(s): Jungmin Park

    In this talk, Dr. Park will introduce how to analyze and quantify side-channel leakage information at various design stages such as RTL, gate level and post-silicon level. Based on these analysis, most vulnerable modules will be searched and replaced with secure modules.

  45. W17 - A New Approach to Measure Hardware Security Coverage

    Online Presentations | 11 Sep 2024 | Contributor(s): Jason Oberg | 2 users

    This presentation will describe important industry initiatives supported by MITRE that can be effectively leveraged for measuring security coverage against common hardware weaknesses. Additionally, it will discuss innovative technical solutions that allow ...

  46. W16 - Asynchronous Circuit Design for Reliability and Security

    Online Presentations | 11 Sep 2024 | Contributor(s): Jia Di | 1 user

    Invented back in 1950’s, asynchronous circuits have not been developing nearly as fast as their clocked, synchronous counterparts. While the synchronous design paradigm dominates the current digital IC market, there are many applications for which asynchronous circuits have unmatched...

  47. W15 - Blockchain for Electronic Supply Chain, Part II

    Online Presentations | 11 Sep 2024 | Contributor(s): Jason Vosatka

    The goal of this webinar is to learn and understand how to protect the electronics supply chain through trustworthy tracking and non-destructive verification of electronic components.  Details of establishing a consortium-style blockchain infrastructure are covered ...

  48. W14 - Machine Learning in Silicon Data Analytics

    Online Presentations | 11 Sep 2024 | Contributor(s): Li-C Wang | 1 user

    This presentation discusses the key ideas for implementing such an end-to-end data analytics solution, and demonstrates its usage in silicon data analytics based on data from actual semiconductor chip product lines.

  49. W13 - System-Level Design of Secured System-on-Chips

    Online Presentations | 10 Sep 2024 | Contributor(s): Christophe Bobda

    This presentation addresses system-level-design of secured system-on-chips through a tighter integration of user-specified security requirements and objectives in the hardware/software design process.  ...

  50. W11 - Computer Vision for HW Security

    Online Presentations | 10 Sep 2024 | Contributor(s): Damon Woodard | 1 user

    This presentation will first provide an overview of computer vision and conventional methods that have been applied to hardware security problems. Also, a detailed discussion of two examples of computer vision-enabled hardware security applications, automated hardware trojan detection ...

  51. W10 - Panel Discussion: State of the Microelectronics Design and Security

    Online Presentations | 11 Sep 2024 | Contributor(s): Matthew Casto, Greg Creech, Serge Leef

    This panel intends to keep the microelectronics design and security community up to date on the status of existing initiatives, new initiatives, and discuss new ideas to pursue collaboration between government, industry, and academia both in research and workforce development.

  52. W09 - Security and Forensics in the IoT Era: From Reverse Engineering to HoneyIoT

    Online Presentations | 10 Sep 2024 | Contributor(s): Yier Jin

    This presentation will first introduce the emerging security and privacy challenges in the IoT domain. Then focus on the bottom-up solutions on IoT protection and will present our recent research effort in microarchitecture supported IoT runtime attack detection and device attestation. ...

  53. W08 - Blockchain for Electronics Supply Chain Integrity. Part I

    Online Presentations | 10 Sep 2024 | Contributor(s): Fahim Rahman

    The goal of this presentation is to understand and learn threats and vulnerabilities introduced in current electronic supply chain; emerging blockchain and distributed ledger framework targeted for data integrity, techniques for developing blockchain-based framework ...

  54. W07 - Architecture Level Vulnerabilities

    Online Presentations | 10 Sep 2024 | Contributor(s): Radu Teodorescu | 1 user

    This presentation introduces the newly discovered transient execution attacks that exploit various forms of speculation employed in modern processors. We discuss the architectural design features that have enabled these attacks, outline some of the software patches ...

  55. W06 - Why CAD/Automation is Needed for HW Security

    Online Presentations | 10 Sep 2024 | Contributor(s): Farimah Farahmandi | 1 user

    The goal of this webinar is to present vulnerabilities introduced during various stages of design life-cycle, CAD tools and methodologies for security assessment and detecting security vulnerabilities, countermeasure tools and methodologies ...

  56. W05 - Hardware Security Verification Using Formal Methods

    Online Presentations | 11 Sep 2024 | Contributor(s): Prabhat Mishra

    Your feedback matters! Help us gain a better understanding of your learning experience. We invite you to complete the following 3-question survey prior to watching this webinar, and complete the following short survey after watching. Thank you.To see the schedule for upcoming live webinars please...

  57. W04 - Physical Assurance and Inspection of Electronics

    Online Presentations | 11 Sep 2024 | Contributor(s): Navid Asadi=Zanjani

    This talk will focus on the state-of-the-art physical inspection/assurance methods, the existing countermeasures, related challenges to develop new countermeasures and a research roadmap for this emerging field.

  58. W03 - Introduction to Hardware Obfuscation

    Online Presentations | 10 Sep 2024 | Contributor(s): Dominic Forte | 1 user

    In this presentation, the following topics will be covered: (1) Overview of the IC design flow and threat models; (2) Summary of naïve protection approaches and their limitations; (3) Introduction to hardware obfuscation variants, applications/use cases, popular metrics, and other...

  59. W61 - Applications of Embedded, High-Resolution On-Chip Instrumentation for Hardware Security and Trust

    Online Presentations | 27 Sep 2024 | Contributor(s): Jim Plusquellic | 8 users

    In this talk, I describe several novel hardware security primitives, called physical unclonable functions (PUFs), which leverage EI to obtain high-resolution path delays and voltage drops, as well as techniques that calibrate for adverse environmental effects and undesirable sources of process...

  60. W62 - Harnessing the Power of LLMs in Semiconductor Test Data Analytics

    Online Presentations | 29 Oct 2024 | Contributor(s): Li-C Wang

    We introduce a novel paradigm, Decision-Support ML (DSML), and explain its implementation in common test data analytics workflows. Using wafermap analytics as a case study, we demonstrate how we built IEA-Plot, an LLM-assisted AI solution...