Call for Papers


Program Committee


Past workshops:

HASP 2020
HASP 2019
HASP 2018
HASP 2017
HASP 2016
HASP 2015
HASP 2014
HASP 2013
HASP 2012

Hardware and Architectural Support for Security and Privacy (HASP) 2021

To be held October 18, 2021 -- virtually in conjunction with MICRO 2021

Workshop Program

The workshop will take place virtually via Zoom. The presentations will occur live as listed below, starting at 10:00 ET on Oct. 18, 2021. Please register for MICRO to get access to the Whova web page (or app) and the Zoom links for the presentations.

10:00 - 10:15 ET Welcome Remarks

Session 1 -- Hardware and Architecture Security

10:15 - 10:30 ET SPARSE: Spatially Aware LFI Resilient State Machine Encoding
Muhtadi Choudhury, Shahin Tajik and Domenic Forte
10:30 - 10:45 ET InTrust-IoT: Intelligent Ecosystem based on Golden Dataset Free Power Profiling of Trusted Device(s) in IoT for Hardware Trojan Detection
Hawzhin Raoof Mohammed, Faiq Khalid, Paul Sawyer, Gabriella Cataloni and Syed Rafay Hasan
10:45 - 11:00 ET Practical and Scalable Security Verification of Secure Architectures
Tianwei Zhang, Jakub Szefer and Ruby Lee

11:00 - 11:15 ET Discussion with Authors / Break

Work-in-Progress Session

11:15 - 11:25 ET WiP: VulnerabiliTree: A Taxonomy of Hardware and Software Computer Attacks for Heuristic Hacking Defense
Sylvia Llosa, Ange Ishimwe and Tamara Lehman
11:25 - 11:35 ET WiP: Mitigate Reverse Engineering Attacks on Deep Neural Networks with Lightweight Obfuscation
Yuezhi Che, Luis Cavanillas and Rujia Wang
11:35 - 11:45 ET WiP: Automatic Transient Execution Attack Detection
Zack McKevitt, Tamara Lehman and Ashutosh Trivedi

11:45 - 12:00 ET Discussion with Authors / Break

Session 2 -- Trusted Execution Environments

12:00 - 12:15 ET A Novel Memory Management for RISC-V Enclaves
Haonan Li, Weijie Huang, Mingde Ren, Hongyi Lu, Zhenyu Ning, Heming Cui and Fengwei Zhang
12:15 - 12:30 ET Towards Trusted IoT Sensing Systems: Implementing PUF as Secure Key Generator for Root of Trust and Message Authentication Code
Kota Yoshida, Kuniyasu Suzaki and Takeshi Fujino
12:30 - 12:45 ET Position Paper: Lessons Learned from Blockchain Applications of Trusted Execution Environments and Implications for Future Research
Rabimba Karanjai, Weidong Shi, Lei Xu, Lin Chen, Fengwei Zhang and Zhimin Gao

12:45 - 13:15 ET Invited Presenation: Arm Confidential Compute Architecture - Enhancing Security on Armv9-A
Presented by Mark Knight and Gareth Stockwell from Arm Ltd.
[ slides ]

13:15 - 13:30 ET Discussion with Authors / Break

Session 3 -- Quantum Computer Security

13:30 - 13:45 ET Short Paper: A Quantum Circuit Obfuscation Methodology for Security and Privacy
Aakarshitha Suresh, Abdullah Ash Saki, Mahababul Alam, Rasit Onur Topaloglu and Swaroop Ghosh
13:45 - 14:00 ET Short Paper: Device- and Locality-Specific Fingerprinting of Shared NISQ Quantum Computers
Allen Mi, Shuwen Deng and Jakub Szefer

14:00 ET Discussion with Authors / Closing Remarks