Asian Hardware Oriented Security and Trust Symposium (AsianHOST)

December 16-18, 2024
Kobe, Japan

AsianHOST 2024 Program

Featured Speakers / Panelists

Professor Bart Preneel
KEYNOTE SPEAKER
Professor Bart Preneel
COSIC, KU Leuven
Cryptography and Supply Chain Security
Professor Patrick Schaumont
KEYNOTE SPEAKER
Professor Patrick Schaumont
Worcester Polytechnic Institute
Practical Security Models for Cryptographic Chip Design
Professor Rui Hou
KEYNOTE SPEAKER
Professor Rui Hou
Institute of Information Engineering, Chinese Academy of Sciences
The Security Architecture Design for General-Purpose Processors
Dr. Katsumi Takahashi
KEYNOTE SPEAKER
Dr. Katsumi Takahashi
Nippon Telegraph and Telephone Corporation
Security R&D from a Telecommunication Company

December 16, 2024 (DAY 0) (All Time in Japan Standard Time)

  • 5:30 PM - 9:00 PM
    Registration & Reception

December 17, 2024 (DAY 1) (All Time in Japan Standard Time)

  • 9:00 AM - 9:20 AM
    Opening Remarks

  • 9:20 AM - 10:10 AM
    Keynote 1

    Session Chair:Makoto Nagata
    Speaker: Bart Preneel (COSIC, KU Leuven)
    Title: Cryptography and Supply Chain Security
  • 10:10 AM - 10:30 AM           BREAK
  • 10:30 AM - 11:30 AM
    Regular Paper Session 1: Physical Phenomena for Hardware Security

    Session Chair:TBA
    • Unveiling Security MRAM-OTP Macro Using MTJ Hard Breakdown Mechanism
      Jiongzhe Su, Haoran Du, Quanhai Zhu, Mingtao Chen, Keyang Zhang, Bo Liu, Hao Cai- National ASIC System Engineering Center, School of Integrated Circuits, Southeast University
    • A True Random Number Generator on FPGA with Jitter-Sampling by Ring Generator
      Tuan Kiet Dang, Trong-Thuc Hoang, Cong-Kha Pham - The University of Electro-Communications
    • Truly Random Number Generation by Using In-Plane Magnetic Tunnel Junction with Weak Anisotropy
      You Wang, Chaoyue Zhang, Yu Gong, Hao Cai, Weiqiang Liu - Nanjing University of Aeronautics and Astronautics, Southeast University
  • LUNCH BREAK
  • 1:00 PM - 1:50 PM
    Keynote 2

    Session Chair: Yuichi Hayashi
    Speaker: Katsumi Takahashi (Nippon Telegraph and Telephone Corporation)
    Title: Security R&D from a Telecommunication Company
  • 1:50 PM - 2:50 PM
    Regular Paper Session 2: Physical Unclonable Functions (PUFs)

    Session Chair:TBA
    • High Reliable Processor-Based PUF on Voltage Over-Scaling Technique
      Xinyuan Zhao, Yijun Cui, Fei Lyu, Chongyan Gu, Chenghua Wang, Weiqiang Liu - Nanjing University of Aeronautics and Astronautics, QUEEN'S UNIVERSITY BELFAST
    • Sorting Attacks Resilient Authentication Protocol for CMOS Image Sensor Based PUF
      Anurag Kamal, Vishesh Mishra, Sparsh Mittal, Mahendra Rathor, Chandan Kumar, Urbi Chatterjee - IIT Kanpur, IIT Roorkee, DAVV Indore
    • A Novel FPGA Mutually Coupled Configurable Ring Oscillator PUF
      James Moore, Jack Miskelly, Maire O'Neill, Chongyan Gu - Electronics Communications and Information Technology, ECIT, Queen’s University Belfast, Belfast, U.K
  • 2:50 PM - 3:10 PM           BREAK
  • 3:10 PM - 4:30 PM
    Regular Paper Session 3: Advanced Physical Attacks (1)

    Session Chair:TBA
    • AutoGuard: A Secure Implementation of the Conditional Branch Instruction
      Zeru Lan, Chunlu Wang, Pengfei Qiu, Yu Jin, Yihao Yang, Dongsheng Wang, Xiaoyong Li, Gang Qu - Key Laboratory of Trustworthy Distributed Computing and Service (BUPT), Ministry of Education, Beijing, China, Department of Computer Science and Technology, Tsinghua University, Zhongguancun Laboratory, Beijing, China, Department of Electrical and Computer Engineering & Institute for Systems Research, University of Maryland, USA
      * Best Paper Award Candidates.
    • Automated Search of Instructions Vulnerable to Fault Injection Attacks in Command Authorization Checks of a TPM 2.0 Implementation
      Ville Yli-Mayry, Thomas Perianin, Sylvain Guilley - Secure-IC K.K., Secure-IC S.A.S.
      * Best Paper Award Candidates.
    • Analysis and Mitigation of Hybrid CMOS/MRAM DFF Vulnerabilities to Laser Fault Injection
      Raphael Comps, Jean-Baptiste Rigaud, Jean-Max Dutertre - Mines Saint-Etienne, CEA, Leti, Centre CMP F - 13541 Gardanne France
    • A Black-Box Targeted Misclassification Attack on Edge AI with Adversarial Examples Generated from RAW Image Sensor Data
      Bowen Hu, Weiyang He, Kuo Wang, Chip-Hong Chang- Nanyang Technological University
      * Best Paper Award Candidates.
  • 4:30 PM - 5:00 PM
    Exhibition Session

  • 6:00 PM - 9:30 PM           Gala Dinner
    Session Chair: TBA
    Invited Speaker: TBA
    Title: TBA

December 18, 2024 (DAY 2) (All Time in Japan Standard Time)

  • 9:00 AM - 9:10 AM
    Announcement

  • 9:10 AM - 10:00 AM
    Keynote 3

    Session Chair: Weiqiang Liu
    Speaker: Patrick Schaumont (Worcester Polytechnic Institute)
    Title: Practical Security Models for Cryptographic Chip Design
  • 10:00 AM - 10:20 AM           BREAK
  • 10:20 AM - 11:40 PM
    Regular Paper Session 4: Advanced Physical Attacks (2)

    Session Chair:TBA
    • Power Side-Channel Key Recovery Attack on a Hardware Implementation of BIKE
      Luke Beckwith, Huizhen Zhou, Jens-Peter Kaps, Kris Gaj - George Mason University
    • Exact Template Attacks with Spectral Computation
      Meriem Mahar, Maamar Ouladj, Sylvain Guilley, Hacène Belbachir, Farid Mokrane - CERIST, Algeria and Université Paris 8, LAGA, UMR 7539, France, CEntre de Recherche sur l'Information Scientifique etTechnique (CERIST), Algeria, TELECOM-ParisTech, Secure-IC S.A.S. Rennes and ENS Paris, RECITS Laboratory, Mathematics faculty, USTHB, Algiers, Algeria, Université Paris 8, LAGA, UMR 7539, France
    • Yet Another Physical Leakage Assessment with the Wasserstein Distance
      Haruka Hirata, Yusaku Harada, Yuko Hara, Kazuo Sakiyama, Yang Li - The University of Electro-Communications, Institute of Science Tokyo
    • A Hybrid Simulation Approach for Accurate and Fast System-Level Side-Channel Leakage Evaluation
      Kazuki Monta, Rikuu Hasegawa, Takafumi Oki, Takuya Wadatsumi, Takuji Miki, Makoto Nagata, Lang Lin, Norman Chang - Secafy Co., Ltd., Kobe University, ANSYS
  • LUNCH BREAK
  • 1:00 PM - 1:50 PM
    Keynote 4

    Session Chair:Yier Jin
    Speaker: Rui Hou (Institute of Information Engineering, Chinese Academy of Sciences)
    Title: The Security Architecture Design for General-Purpose Processors
  • 1:50 PM - 3:10 PM
    Regular Paper Session 5: Security and Verification in RISC-V and Embedded Systems

    Session Chair:TBA
    • A Consistency Testing Method for Revealing RISC-V Processor's Undocumented Instructions
      Wen Wang, Peng Liu - College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou, China
    • Secure and Scalable UVM Verification Components (UVCs) to Accelerate Functional Verification of RISC-V Based SoCs
      Muhammad Yasir Farooq, Haroon Waris, Nasir Mohyuddin, Sajid Baloch, Yu Gong, Weiqiang Liu - Institute of Space Technology, Islamabad, Pakistan, Centres of Excellence in Science & Applied Technologies, Nanjing University of Aeronautics and Astronautics, Nanjing, China
    • SecRiSBen: A RISC-V Based SoC Benchmark for Evaluation of Security Verification Tools
      Maoyuan Cai, Aijiao Cui, Yier Jin - Harbin Institute of Technology (Shenzhen), University of Science and Technology of China
    • PreLock: Precision Locking for Protecting Embedded Processor
      Tomosuke Ichioka, Yohei Watanabe, Yuko Hara - Tokyo Institute of Technology, The University of Electro-Communications
  • 3:10 PM - 3:30 PM           BREAK
  • 3:30 PM - 4:30 PM
    PhD Forum Presentation

    Session Chair:Daisuke Fujimoto
  • 4:30 PM - 5:30 PM
    PhD Forum Poster with Snacks and Drink
  • 5:30 PM - 6:00 PM
    Closing Remarks and Awards Announcement