Program
Time (PDT) | Duration | Presentations | ||
---|---|---|---|---|
8:00 am - 8:10 am | 10 mins | Intro from organizers (Logistics) | ||
8:10 am - 9:00 am | 50 mins | Keynote 1: Secure Heteregenous Integration: Challenges and Solutions Farimah Farahmandi, Associate Director of FICS and Assistant Professor, University of Florida |
[Abstract] | [Slides] |
9:00 am - 9:30 am | 30 mins | Can’t See the Forest for All the TEEs Moritz Schneider, PhD Student, ETH Zürich |
[Abstract] | [Slides] |
9:30 am - 10:00 am | 30 mins | Snatching Defeat From the Jaws of Victory: How to Do Everything Right and Still Design Hardware That Is Easy to Get Into Ron Minnich, Senior Staff Software Engineer, Google |
[Abstract] | [Slides] |
10:00 am - 10:40 am | 40 mins | Coffee break/Lunch break | ||
10:40 am - 11:30 am | 50 mins | Keynote 2: Managing Security Trade-offs Against Economics of Chip Design Serge Leef, Head of Azure for Secure Microelectronics, Microsoft |
[Abstract] | [Slides] |
11:30 am - 12:00 pm | 30 mins | Blockchain-based Community Corroboration for Zero Trust Architectures and Systems Zhixiong Chen, Professor, Mercy College |
[Abstract] | [Slides] |
12:00 pm - 12:40 pm | 40 mins | Coffee break/Lunch break | ||
12:40 pm - 1:10 pm | 30 mins | Looking Beyond Microarchitectural-Only Side Channels Joseph Ravichandran, PhD Student, MIT |
[Abstract] | [Slides] |
1:10 pm - 1:40 pm | 30 mins | Overview of Post-Quantum Hash-Based Signature Schemes Nathan Manohar, Research Scientist, IBM Research |
[Abstract] | [Slides] |
1:40 pm - 1:50 pm | 10 mins | Coffee break | ||
1:50 pm - 2:20 pm | 30 mins | Toward High-Confidence System-Level Tamper Detection Using Impedance Sensing Tahoura Mosavirik, PhD Student, WPI |
[Abstract] | [Slides] |
2:20 pm - 2:50 pm | 30 mins | Confidential Computing across Multiple Devices Jon Lange, Distinguished Engineer, Microsoft |
[Abstract] | [Slides] |
2:50 pm - 3:20 pm | 30 mins | Secure System Firmware and Architecture Todd Takken, Research Staff Member, IBM Research |
[Abstract] | [Slides] |
3:20 pm - 3:30 pm | 10 mins | Closing remarks from organizers |
© ZTHA: Zero Trust Hardware Architectures Workshop@ICCAD, 2022