Asian Hardware Oriented Security and Trust Symposium (AsianHOST)

December 17-18, 2018
Conference Lodge @ HKUST
Hong Kong

AsianHOST2018 Program

Featured Speakers / Panelists

Makoto Ikeda
INVITED SPEAKER
Makoto Ikeda
U. of Tokyo
Marilyn Wolf
INVITED SPEAKER
Marilyn C. Wolf
Georgia Tech
Sandip Kundu
INVITED SPEAKER
Sandip Kundu
NSF and UM Amherst
Naehyuck Chang
INVITED SPEAKER
Naehyuck Chang
KAIST
Ahmad-Reza Sadeghi
INVITED SPEAKER
Ahmad-Reza Sadeghi
TU Darmstadt

AsianHOST 2018 Technical Program

AsianHOST 2018 Program Highlights

  • 5 Featured Invited Speakers showcasing some of the world’s leading innovative thinkers in hardware security! It includes 2 Keynote Talks and 3 Visionary Talks.
  • 19 Technical Papers
  • Invited speakers:
    • Makoto Ikeda - University of Tokyo
    • Ahmad-Reza Sadeghi - Technische Universität Darmstadt
    • Marilyn Wolf - Georgia Tech
    • Naehyuck Chang - Korea Advanced Institute of Science and Technology (KAIST)
    • Sandip Kundu – National Science Foundation and University of Massachusetts, Amherst
  • A Panel on Hardware Supply Chain Security

Sunday, December 16, 2018

  • 5:00 - 7:00PM Conference Reception @ Conference Lodge

Monday, December 17, 2018

  • 8:00 - 9:00AM Registration @ Institute for Advanced Study (IAS)
  • SESSION 1: PLENARY SESSION
    Moderator: Tim Cheng, Dean of Engineering, Hong Kong University of Science and Technology
  • 9:00 - 9:15AM Opening Remarks: AsianHOST 2018 General and Program Chairs
  • 9:15 - 10:00AM KEYNOTE 1
    Speaker: Makoto Ideda, University of Tokyo
    Title: Exploring Elliptic Curve based cryptography hardware design
  • 10:00 - 10:30AM COFFEE BREAK
  • 10:30 - 11:50AM SESSION 2: HARDWARE-ORIENTED ATTACKS
    Session Chair: Wei Hu, Northwestern Polytechnical University
    • An Efficient Hardware-Oriented Runtime Approach for Stack-based Software Buffer Overflow Attacks*
      Love Sah, Sheikh Ariful Islam and Srinivas Katkoori – Univ. of South Florida
    • Probing Attacks on Key Agreement for Automotive Controller Area Networks*
      Shalabh Jain – Bosch Research and Technology Center
      Qian Wang, and Md Tanvir Arafin – Univ. of Maryland
      Jorge Guajardo Merchan – Robert Bosch LLC, RTC, USA
    • Modeling and Efficiency Analysis of Clock Glitch Fault Injection Attack
      Bo Ning and Qiang Liu – Tianjin Univ.
    • A Wavelet-based Power Analysis Attack against Random Delay Countermeasure
      Xiaofei Dong, Fan Zhang, Samiya Queshi, Yiran Zhang, Ziyuan Liang and Feng Gao – Zhejiang Univ.
    *Best Paper Candidate
  • 11:50AM - 1:30PM LUNCH
  • 1:30 – 2:00PM SESSION 3: VISIONARY TALK 1
    Moderator: Yier Jin, University of Florida
    Speaker: Sandip Kundu, NSF and University of Massachusetts, Amherst
    Title: Adversarial Attacks on Machine Learning Systems
  • 2:00 - 3:20 PM SESSION 4: PHYSICAL UNCLONABLE FUNCTION
    Session Chair: Jia Di, University Arkansas
    • Defeating Strong PUF Modeling Attack via Adverse Selection of Challenge-Response Pairs*
      Horácio França – UFRJ
      Charles Prado – National Institute of Metrology, Quality and Technology
      Vinay Patil and Sandip Kundu – Univ. of Massachusetts Amherst
    • Bias PUF based Secure Scan Chain Design
      Wenjie Li, Jing Ye, Xiaowei Li, Huawei Li and Yu Hu – Chinese Academy of Sciences
    • The Cell Dependency Analysis on Learning SRAM Power-Up States
      Zhonghao Liao and Yong Guan – Lowa State Univ.
    • Generation of PUF-keys on FPGAs by K-means Frequency Clustering
      Asha K A, Abhishek Patyal and Hung-Ming Chen – National Chiao Tung Univ.
  • 3:20 - 3:50PM COFFEE BREAK
  • 3:50 - 4:20PM SESSION 5: VISIONARY TALK 2
    Moderator: Gang Qu, University of Maryland
    Speaker: Naehyuck Chang, KAIST
    Title: Design Automation of Low-Power Cyber-Physical Systems
  • 4:20 - 5:40PM SESSION 6: MACHINE LEARNING ON HARDWARE SECURITY
    Session Chair: Haihua Shen, University of Chinese Academy of Sciences
    • Machine Learning Attacks on VOS-based Lightweight Authentication
      Jiliang Zhang – Hunan Univ.
    • SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation
      Prabuddha Chakraborty, Jonathan Cruz and Swarup Bhunia – Univ. of Florida
    • Preventing Neural Network Model Exfiltration in Machine Learning Hardware Accelerators
      Mihailo Isakov, Lake Bu, Hai Cheng and Michel Kinsy - Boston Univ.
    • Detecting RTL Trojans using Artificial Immune Systems and High-Level Behavior Classification
      Farhath Zareen and Robert Karam – Univ. of South Florida
  • 6:00 - 8:30PM BANQUET AND AWARD CEREMONY
    • Ceremony Moderators:
      Tim Cheng, Dean of Engineering, Hong Kong University of Science and Technology
      Wei Zhang, Hong Kong University of Science and Technology
      Gang Qu, Professor, University of Maryland

    • Best Paper Moderator:
      Qiang (Johnny) Xu, The Chinese University of Hong Kong

Tuesday, December 18, 2018

  • 8:30 - 9:00AM Registration
  • 9:00 - 10:15AM SESSION 7: PLENARY SESSION
    Moderator: Qiang (Johnny) Xu, The Chinese University of Hong Kong
  • 9:00 - 9:45AM KEYNOTE 2
    Speaker: Ahmad-Reza Sadeghi, TU Darmstadt
    Title: Mind the Gap: Promises, Pitfalls, and Opportunities of Hardware-Assisted Security
  • 9:45 - 10:15AM VISIONARY TALK 3
    Speaker: Marilyn C. Wolf, Georgia Tech
    Title: Design Processes for Security and Safety
  • 10:15 - 10:40AM COFFEE BREAK
  • 10:40AM - 12:00PM SESSION 8: PREVENTIVE COUNTERMEASURES
    Session Chair: Yongqiang Lyu, Tsinghua University
    • Cost-efficient 3D Integration to Hinder Reverse Engineering During and After Manufacturing
      Peng Gu, Dylan Stow, Prashansa Mukim, Shuangchen Li and Yuan Xie – UCSB
    • Secrecy Performance of Cognitive Radio Sensor Networks with an Energy-Harvesting based Eavesdropper and Imperfect CSI
      Rongjun Tan, Yuan Gao, Haixia He and Yuan Cao – Hohai Univ.
    • A Delay based Plug-in-Monitor for Intrusion Detection in Controller Area Network
      Qian Wang, Yiming Qian, Gang Qu and Yasser Shoukry – Univ. of Maryland
      Zhaojun Lu – Huazhong Univ. of Science and Technology
    • A Novel Lightweight Hardware-assisted Static Instrumentation Approach for ARM SoC Using Debug Components
      Muhammad Abdul Wahab, Mounir Nasr Allah, and Guillaume Hiet – CentraleSupélec
      Pascal Cotret - independent researcher
      Vianney Lapotre, Guy Gogniat – Université de Bretagne-Sud
      Arnab Kumar Biswas – UBS
  • 12:00 - 1:30PM LUNCH
  • 1:30 - 2:30PM SESSION 9: VULNERABILITY ANALYSIS
    Session Chair: Sheng Wei, University of Rutgers
    • A Comprehensive Analysis on Vulnerability of Active Shields to Tilted Microprobing Attacks
      Qihang Shi, Huanyu Wang, Navid Asadizanjani, Mark Tehranipoor and Domenic Forte – Univ. of Florida
    • Ring Oscillator Based Random Number Generator Using Wake-up and Shut-down Uncertainties
      Mehmet Alp Şarkışla – TUBITAK
      Salih Ergun – ERGTECH Research Center
    • Empirical Word-Level Analysis of Arithmetic Module Architectures for Hardware Trojan Susceptibility
      Sheikh Ariful Islam, Srinivas Katkoori and Love Kumar Sah – Univ. of South Florida
  • 2:30 - 3:30PM SESSION 10: PANEL
    Topic: Hardware Supply Chain Security in Asia and Around the World
    Panel Organizers: Gang Qu, University of Maryland
    Panel Moderator: Gang Qu, University of Maryland
    • Panelists:
      Mark Tehranipoor - University of Florida
      Yousef Iskander - Cisco
      Marilyn Wolf - Georgia Tech
      Sandip Kundu - National Science Foundation and University of Massachusetts, Amherst
      Tim Cheng - Hong Kong University of Science and Technology
      Haihua Shen - University of Chinese Academy of Sciences
  • 3:30 - 3:45PM Closing Remarks

A pdf version of the program for AsianHOST 2018 can be viewed here.

Sponsors

Technical Sponsor

IEEE
CEDA
HKUST
IEEE Systems Council

Platinum Sponsor

Huawei

Gold Sponsor

OSR
Cisco