HASP Logo

Call for Papers

Organizers

Program Committee

Program


Past workshops:

HASP 2024
HASP 2023
HASP 2022
HASP 2021
HASP 2020
HASP 2019
HASP 2018
HASP 2017
HASP 2016
HASP 2015
HASP 2014
HASP 2013
HASP 2012

Hardware and Architectural Support for Security and Privacy (HASP) 2025

co-located with MICRO 2025, October 19, Seoul, Korea

Room: Schubert (President Hotel, 31F)

Zoom Registration

Best Paper Vote

Workshop Program

8:10 – 8:15 Welcome Remarks

8:15 – 9:00 Keynote Talk 1: The Haunted Interconnect: The Scary World of Shared Interconnection Networks
John Kim (KAIST)

Session 1: Best Paper Candidates
9:00 – 9:20 CRAFT: Characterizing and Root-Causing Fault Injection Threats at Pre-Silicon
Arsalan Ali Malik, Harshvadan Mihir and Aydin Aysu
9:20 – 9:40 A Close Look at RMP Entry Caching and Its Security Implications
Alexis Bagia, Vincent Ulitzsch, Daniël Trujillo, Mengyuan Li, Mengjia Yan and Jean-Pierre Seifert
9:40 – 10:00 MTU: The Multifunction Tree Unit for Accelerating Zero-Knowledge Proofs
Jianqiao Mo, Alhad Daftardar, Joey Ah-Kiow, Kaiyue Guo, Benedikt Bünz, Siddharth Garg and Brandon Reagen

10:00 – 10:30 Tea break

10:30 – 11:15 Keynote Talk 2: Ant’s Journey in Confidential Computing: From Technology Innovation to Real-world Applications
Shoumeng Yan (Ant Group)

Session 2: Microarchitecture Design for Security
11:15 – 11:35 MAGNET: Memory Tagging with Efficient Tag Prediction
Pratyush Makkar, Hossam Elatali, Adam Caulfield and N. Asokan
11:35 – 11:50 SquareLoop: Explore Optimal Authentication Block Strategy for ML
Jan Strzeszynski, Jianming Tong, Kyungmi Lee, Nathan Xiong, Angshuman Parashar, Joel Emer, Tushar Krishna and Mengjia Yan
11:50 – 12:00 Best Paper Award announcement

12:00 – 13:00 Lunch

13:00 – 13:45 Keynote Talk 3: Path to the Siloso Processor: Our Recent Side-Channel Developments, and Thoughts on How to Build a Shared Security Research Platform
Trevor E. Carlson (National University of Singapore)

Session 3: System Security Analysis and Defense
13:45 – 14:05 AccNimbus: Scalable Proofs of Data Possession for Cloud Storage
Collin MacDonald, Pankaj Niroula, Aashutosh Poudel and Stephen Herwig
14:05 – 14:25 Feasibility of Scalable Performance Counter Malware Detection Framework Using LightGBM
Chutitep Woralert, Chen Liu and Zander Blasingame
14:25 – 14:45 PathGuard: Path-Aware Syscall Filtering for IoT Embedded Systems
Sanggu Lee and Jihong Kim
14:45 – 15:00 WiP: Understanding Real-World Impact of Downfall Attack: Analysis of Vector Register Usage in Linux Packages
Yohei Harata and Soramichi Akiyama

15:00 – 15:30 Tea break

Session 4: Securing the Physical Layer
15:30 – 15:50 Enabling Gem5 for Side-Channel Power Attack Simulation of Cryptographic Algorithms
Christian Appold, Yong Hu, Ernesto Cristopher Villegas Castillo, Hans-Martin Bluethgen and Tim Leinmueller
15:50 – 16:10 SRAM-based PUF Implementation and Bias Patterns on AMD Xilinx UltraScale+
Clemens Fritzsch, Wakiya Schulz, Tobias Rosenkranz, Pascal Ahr, Antonio Saavedra, Lars Renkes, Christoph Lipps and Joern Hoffmann
16:10 – 16:30 WeightSentry: Real-Time Bit-Flip Protection for Deep Neural Networks on GPUs
Mahmoud Abumandour, Srinija Ramischetty, Guru P. Venkataramani and Alaa Alameldeen
16:30 – 16:50 Securing HHL Quantum Algorithm against Quantum Computer Attacks
Yizhuo Tan, Hrvoje Kukina and Jakub Szefer

After 16:50 Mentoring and network session