8:30 - 8:35 | Welcome Remarks |
Session 1: Memory Safety and Code Reuse Attacks | |
8:35 - 9:00 |
Exploring the Performance Implications of Memory Safety Primitives in Many-core Processors Executing Multi-threaded Workloads Masab Ahmad, Syed Kamran Haider, Farrukh Hijaz, Marten van Dijk and Omer Khan PDF via ACM Digital Library Presentation Slides |
9:00 - 9:25 |
Towards a Practical Solution to Detect Code Reuse Attacks on ARM Mobile Devices Yongje Lee, Ingoo Heo, Dongil Hwang, Kyungmin Kim and Yunheung Paek PDF via ACM Digital Library Presentation Slides |
Session 2: Side-Channels and Information Leakage | |
9:25 - 9:50 |
Side-Channel Analysis of MAC-Keccak Hardware Implementations Pei Luo, Yunsi Fei, A. Adam Ding, Xin Fang, David Kaeli and Miriam Leeser PDF via ACM Digital Library Presentation Slides |
9:50 - 10:15 |
Can randomized mapping secure instruction caches from side-channel attacks? Fangfei Liu, Hao Wu and Ruby B. Lee PDF via ACM Digital Library Presentation Slides |
10:15 - 10:40 |
Covert Channels through Branch Predictors: A Feasibility Study Dmitry Evtyushkin, Dmitry Ponomarev and Nael Abu-Ghazaleh PDF via ACM Digital Library Presentation Slides Presentation ODP File |
10:40 - 11:05 |
Support Vector Regression: Exploiting Machine Learning Techniques for Leakage Modeling Dirmanto Jap, Marc Stottinger and Shivam Bhasin PDF via ACM Digital Library Presentation Slides |
11:05 - 11:30 | Coffee Break |
Session 3: Short Papers | |
11:30 - 11:45 |
Hardware Overhead Analysis of Programmability in ARX Crypto Processing Mohamed Aly and Kevin Skadron PDF via ACM Digital Library No Slides |
11:45 - 12:00 |
Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack Alexander De Trano, Naghmeh Karimi, Ramesh Karri, Rex Guo and Sylvain Guilley PDF via ACM Digital Library Presentation Slides |
12:00 - 12:15 |
Predicting Program Phases and Defending Against Side-Channel Attacks using Hardware Performance Counters Junaid Nomani and Jakub Szefer PDF via ACM Digital Library Presentation Slides |
12:15 - 12:30 |
Performance Optimizations of Integrity Checking based on Merkle Trees Salaheddine Ouaarab, Renaud Pacalet, Guillaume Duc and Jeremie Brunel PDF via ACM Digital Library No Slides |
12:30 | End of Workshop -- Lunch |