Asian Hardware Oriented Security and Trust Symposium (AsianHOST)

December 16-18, 2024
Kobe, Japan
Proceedings Download



AsianHOST 2024 Program

Featured Speakers / Panelists

Professor Bart Preneel
KEYNOTE SPEAKER
Professor Bart Preneel
COSIC, KU Leuven
Cryptography and Supply Chain Security
Professor Patrick Schaumont
KEYNOTE SPEAKER
Professor Patrick Schaumont
Worcester Polytechnic Institute
Practical Security Models for Cryptographic Chip Design
Professor Rui Hou
KEYNOTE SPEAKER
Professor Rui Hou
Institute of Information Engineering, Chinese Academy of Sciences
The Security Architecture Design for General-Purpose Processors
Dr. Katsumi Takahashi
KEYNOTE SPEAKER
Dr. Katsumi Takahashi
Nippon Telegraph and Telephone Corporation
Security R&D from a Telecommunication Company

December 16, 2024 (DAY 0) (All Time in Japan Standard Time)

  • 5:30 PM - 6:30 PM
    Registration
    Place: 2nd floor of the symposium venue
  • 6:30 PM - 8:30 PM
    Symposium Reception
    Place: 4th floor of the symposium venue

December 17, 2024 (DAY 1) (All Time in Japan Standard Time)

  • Registration: 8:30 AM - 17:00 PM
    Place: 2nd floor of the symposium venue
    • 9:00 AM - 9:20 AM
      Opening Remarks

    • 9:20 AM - 10:10 AM
      Keynote 1

      Session Chair: Makoto Nagata
      Speaker: Bart Preneel (COSIC, KU Leuven)
      Title: Cryptography and Supply Chain Security
    • 10:10 AM - 10:30 AM           BREAK
    • 10:30 AM - 11:30 AM
      Regular Paper Session 1: Physical Phenomena for Hardware Security

      Session Chair: Junko Takahashi (Nippon Telegraph and Telephone Corporation)
      • Unveiling Security MRAM-OTP Macro Using MTJ Hard Breakdown Mechanism
        Jiongzhe Su, Haoran Du, Quanhai Zhu, Mingtao Chen, Keyang Zhang, Bo Liu, Hao Cai- National ASIC System Engineering Center, School of Integrated Circuits, Southeast University
      • A True Random Number Generator on FPGA with Jitter-Sampling by Ring Generator
        Tuan Kiet Dang, Trong-Thuc Hoang, Cong-Kha Pham - The University of Electro-Communications
      • Truly Random Number Generation by Using In-Plane Magnetic Tunnel Junction with Weak Anisotropy
        You Wang, Chaoyue Zhang, Yu Gong, Hao Cai, Weiqiang Liu - Nanjing University of Aeronautics and Astronautics, Southeast University
    • LUNCH BREAK
    • 1:00 PM - 1:50 PM
      Keynote 2

      Session Chair: Yuichi Hayashi
      Speaker: Katsumi Takahashi (Nippon Telegraph and Telephone Corporation)
      Title: Security R&D from a Telecommunication Company
    • 1:50 PM - 2:50 PM
      Regular Paper Session 2: Physical Unclonable Functions (PUFs)

      Session Chair: Gu Chongyan (Queen's University)
      • High Reliable Processor-Based PUF on Voltage Over-Scaling Technique
        Xinyuan Zhao, Yijun Cui, Fei Lyu, Chongyan Gu, Chenghua Wang, Weiqiang Liu - Nanjing University of Aeronautics and Astronautics, QUEEN'S UNIVERSITY BELFAST
      • Sorting Attacks Resilient Authentication Protocol for CMOS Image Sensor Based PUF
        Anurag Kamal, Vishesh Mishra, Sparsh Mittal, Mahendra Rathor, Chandan Kumar, Urbi Chatterjee - IIT Kanpur, IIT Roorkee, DAVV Indore
      • A Novel FPGA Mutually Coupled Configurable Ring Oscillator PUF
        James Moore, Jack Miskelly, Maire O'Neill, Chongyan Gu - Electronics Communications and Information Technology, ECIT, Queen’s University Belfast, Belfast, U.K
    • 2:50 PM - 3:10 PM           BREAK
    • 3:10 PM - 4:30 PM
      Regular Paper Session 3: Advanced Physical Attacks (1)

      Session Chair: Noriyuki Miura (Osaka University)
      • AutoGuard: A Secure Implementation of the Conditional Branch Instruction
        Zeru Lan, Chunlu Wang, Pengfei Qiu, Yu Jin, Yihao Yang, Dongsheng Wang, Xiaoyong Li, Gang Qu - Key Laboratory of Trustworthy Distributed Computing and Service (BUPT), Ministry of Education, Beijing, China, Department of Computer Science and Technology, Tsinghua University, Zhongguancun Laboratory, Beijing, China, Department of Electrical and Computer Engineering & Institute for Systems Research, University of Maryland, USA
        * Best Paper Award Candidates.
      • Automated Search of Instructions Vulnerable to Fault Injection Attacks in Command Authorization Checks of a TPM 2.0 Implementation
        Ville Yli-Mayry, Thomas Perianin, Sylvain Guilley - Secure-IC K.K., Secure-IC S.A.S.
        * Best Paper Award Candidates.
      • Analysis and Mitigation of Hybrid CMOS/MRAM DFF Vulnerabilities to Laser Fault Injection
        Raphael Comps, Jean-Baptiste Rigaud, Jean-Max Dutertre - Mines Saint-Etienne, CEA, Leti, Centre CMP F - 13541 Gardanne France
      • A Black-Box Targeted Misclassification Attack on Edge AI with Adversarial Examples Generated from RAW Image Sensor Data
        Bowen Hu, Weiyang He, Kuo Wang, Chip-Hong Chang- Nanyang Technological University
        * Best Paper Award Candidates.
    • 4:30 PM - 5:00 PM
      Exhibition Session

    • 6:30 PM - 8:30 PM           Gala Dinner
      Place: Fukuju https://enjoyfukuju.com/en/
      (Bus will depart at 17:30 in front of the symposium venue)
      Session Chair: TBA
      Invited Speaker: TBA
      Title: TBA

    December 18, 2024 (DAY 2) (All Time in Japan Standard Time)

  • Registration: 8:30 AM - 15:00 PM
    Place: 2nd floor of the symposium venue
    • 9:00 AM - 9:10 AM
      Announcement

    • 9:10 AM - 10:00 AM
      Keynote 3

      Session Chair: Weiqiang Liu
      Speaker: Patrick Schaumont (Worcester Polytechnic Institute)
      Title: Practical Security Models for Cryptographic Chip Design
    • 10:00 AM - 10:20 AM           BREAK
    • 10:20 AM - 11:40 PM
      Regular Paper Session 4: Advanced Physical Attacks (2)

      Session Chair: Qiu Pengfei (Beijing University of Posts and Telecommunications)
      • Power Side-Channel Key Recovery Attack on a Hardware Implementation of BIKE
        Luke Beckwith, Huizhen Zhou, Jens-Peter Kaps, Kris Gaj - George Mason University
      • Exact Template Attacks with Spectral Computation
        Meriem Mahar, Maamar Ouladj, Sylvain Guilley, Hacène Belbachir, Farid Mokrane - CERIST, Algeria and Université Paris 8, LAGA, UMR 7539, France, CEntre de Recherche sur l'Information Scientifique etTechnique (CERIST), Algeria, TELECOM-ParisTech, Secure-IC S.A.S. Rennes and ENS Paris, RECITS Laboratory, Mathematics faculty, USTHB, Algiers, Algeria, Université Paris 8, LAGA, UMR 7539, France
      • Yet Another Physical Leakage Assessment with the Wasserstein Distance
        Haruka Hirata, Yusaku Harada, Yuko Hara, Kazuo Sakiyama, Yang Li - The University of Electro-Communications, Institute of Science Tokyo
      • A Hybrid Simulation Approach for Accurate and Fast System-Level Side-Channel Leakage Evaluation
        Kazuki Monta, Rikuu Hasegawa, Takafumi Oki, Takuya Wadatsumi, Takuji Miki, Makoto Nagata, Lang Lin, Norman Chang - Secafy Co., Ltd., Kobe University, ANSYS
    • LUNCH BREAK
    • 1:00 PM - 1:50 PM
      Keynote 4

      Session Chair: Yier Jin
      Speaker: Rui Hou (Institute of Information Engineering, Chinese Academy of Sciences)
      Title: The Security Architecture Design for General-Purpose Processors
    • 1:50 PM - 2:50 PM
      Regular Paper Session 5: Security and Verification in RISC-V and Embedded Systems

      Session Chair: Nashimoto Shoei (Mitsubishi Electric Corporation)
      • A Consistency Testing Method for Revealing RISC-V Processor's Undocumented Instructions
        Wen Wang, Peng Liu - College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou, China
      • SecRiSBen: A RISC-V Based SoC Benchmark for Evaluation of Security Verification Tools
        Maoyuan Cai, Aijiao Cui, Yier Jin - Harbin Institute of Technology (Shenzhen), University of Science and Technology of China
      • PreLock: Precision Locking for Protecting Embedded Processor
        Tomosuke Ichioka, Yohei Watanabe, Yuko Hara - Tokyo Institute of Technology, The University of Electro-Communications
    • 2:50 PM - 3:10 PM           BREAK
    • 3:10 PM - 4:10 PM
      PhD Forum Presentation

      Session Chair: Daisuke Fujimoto
      • RCRO-PUF: A Reliable and Low-Power RRAM-Based CRO PUF for Enhanced Security
        Jiang Li, Yijun Cui, Chenghua Wang, Chongyan Gu and Weiqiang Liu - College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics
      • Pre-Silicon Formal Verification and Post-Silicon Runtime Monitoring on RISC-V Processors
        Czea Sie Chuah and Christian Appold - School of Computation, Information and Technology, Technical University of Munich
      • MTPM-PUF: A Configurable and Low-Power Logic-Compatible Multiple-Time Programmable (MTP) Memory-Based Intrinsic PUF
        Kangkang Rui, Yao Li, Jiang Li, Yijun Cui and Chenghua Wang - College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics
      • Optimized hardware implementation of Plantard modular reduction for Lattice-Based Cryptography
        Jiansheng Chen, Mengxue Li, Bei Wang, Yijun Cui, Chenghua Wang and Weiqiang Liu - College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics
      • Research on Hardware Vulnerability Detection via Fuzzing Test
        Lei Peng, Aijiao Cui, Gang Qu and Wei Zhang - Harbin Institute of Technology
      • Exploring Security Threats in Automated AI Accelerator Generation Platforms
        Chao Guo - Graduate School of Fundamental Science and Engineering, Waseda University
      • Measurement and Simulation of On-chip Voltage Fluctuation Caused by EM Injection
        Rikuu Hasegawa, Takuya Wadatsumi, Kazuki Monta, Takuji Miki, Lang Lin, Norman Chang and Makoto Nagata - Graduate School of Science, Technology and Innovation, Kobe University
      • Detection Method for Hardware Trojans in PCBs and Peripherals Using Oscillation Frequency Changes in Digital Ring Oscillators
        Koki Abe, Daisuke Fujimoto and Yuichi Hayashi - Graduate School of Science and Technology, Nara Institute of Science and Technology
      • A Lightweight and Efficient BRAM-free NTT Unit for Crystals-Dilithium
        Junjie Zhong, Bei Wang, Zeren Zhu, Weiqiang Liu and Yijun Cui - College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics
      • A Simulation Technique of Thermal Side Channel Leakage of Cryptographic Circuits
        Shuhei Yokota, Rikuu Hasegawa, Kazuki Monta, Takaaki Okidono, Takuji Miki and Makoto Nagata - Science Technology and Information, Kobe University
      • A Non-Invasive Method for Detecting Aging of Microcontrollers Based on Side-Channel Analysis
        Yuki Kaneko and Naofumi Homma - Research Institute of Electrical Communication/Graduate School of Engineering, Tohoku University
      • A Technique for Label Inference Attack on Split Learning
        Lixin Zhang, Xinyan Gao, Ran Mao, Yintai Sun, Yuexiang Jin, Zhenyu Guan and Song Bian - School of Cyber Science and Technology, Beihang University
      • Verify the Relationship Between Randomness and D-FF Synchronous Circuit Size in RO-based RNG
        Ryoichi Sato, Mitsuki Fujiwara, Yasuyuki Nogami and Yuta Kodera - Graduate School of Environmental, Life, Natural Science and Technology, Okayama University
      • Probing Attacks on PUFs
        James Moore, Jack Miskelly and Chongyan Gu - Queen's University Belfast
    • 4:10 PM - 5:10 PM
      PhD Forum Poster with Snacks and Drink

      Place: 1st floor of the symposium venue
    • 5:10 PM - 5:40 PM
      Closing Remarks and Awards Announcement