Program
| Time (PDT) | Duration | Presentations | ||
|---|---|---|---|---|
| 8:00 am - 8:10 am | 10 mins | Intro from organizers (Logistics) | ||
| 8:10 am - 9:00 am | 50 mins | Keynote 1: Secure Heteregenous Integration: Challenges and Solutions Farimah Farahmandi, Associate Director of FICS and Assistant Professor, University of Florida |
[Abstract] | [Slides] |
| 9:00 am - 9:30 am | 30 mins | Can’t See the Forest for All the TEEs Moritz Schneider, PhD Student, ETH Zürich |
[Abstract] | [Slides] |
| 9:30 am - 10:00 am | 30 mins | Snatching Defeat From the Jaws of Victory: How to Do Everything Right and Still Design Hardware That Is Easy to Get Into Ron Minnich, Senior Staff Software Engineer, Google |
[Abstract] | [Slides] |
| 10:00 am - 10:40 am | 40 mins | Coffee break/Lunch break | ||
| 10:40 am - 11:30 am | 50 mins | Keynote 2: Managing Security Trade-offs Against Economics of Chip Design Serge Leef, Head of Azure for Secure Microelectronics, Microsoft |
[Abstract] | [Slides] |
| 11:30 am - 12:00 pm | 30 mins | Blockchain-based Community Corroboration for Zero Trust Architectures and Systems Zhixiong Chen, Professor, Mercy College |
[Abstract] | [Slides] |
| 12:00 pm - 12:40 pm | 40 mins | Coffee break/Lunch break | ||
| 12:40 pm - 1:10 pm | 30 mins | Looking Beyond Microarchitectural-Only Side Channels Joseph Ravichandran, PhD Student, MIT |
[Abstract] | [Slides] |
| 1:10 pm - 1:40 pm | 30 mins | Overview of Post-Quantum Hash-Based Signature Schemes Nathan Manohar, Research Scientist, IBM Research |
[Abstract] | [Slides] |
| 1:40 pm - 1:50 pm | 10 mins | Coffee break | ||
| 1:50 pm - 2:20 pm | 30 mins | Toward High-Confidence System-Level Tamper Detection Using Impedance Sensing Tahoura Mosavirik, PhD Student, WPI |
[Abstract] | [Slides] |
| 2:20 pm - 2:50 pm | 30 mins | Confidential Computing across Multiple Devices Jon Lange, Distinguished Engineer, Microsoft |
[Abstract] | [Slides] |
| 2:50 pm - 3:20 pm | 30 mins | Secure System Firmware and Architecture Todd Takken, Research Staff Member, IBM Research |
[Abstract] | [Slides] |
| 3:20 pm - 3:30 pm | 10 mins | Closing remarks from organizers |
© ZTHA: Zero Trust Hardware Architectures Workshop@ICCAD, 2022