Kickoff Meeting Agenda

CHEST IUCRC Kickoff Meeting
December 16-17, 2019
University of Cincinnati

Zimmer Auditorium, Zimmer Hall (Map), 315 College Dr, Cincinnati OH 45221

Register at https://www.surveymonkey.com/r/HLT7RGR

Registration is open to industrial, commercial, and DoD organizations interested in becoming members of the NSF CHEST IUCRC Center and faculty and staff from the six participating universities (University of Texas at Dallas, University of Connecticut, Northeastern University, University of California Davis, University of Virginia, and University of Cincinnati). NOTE: It is not too late to become a CHEST Industrial Advisory Board (IAB) member.

  • If you have already provided a letter for commitment for CHEST, please come
  • If you are considering becoming a CHEST IAB member, please come
  • Please invite co-workers with interest in Hardware and Embedded Systems Security, Assurance, and Trust

Travel, Location, and Hotel Information

AGENDA

Download Whitepapers and Presentations

Day 1:

07:30 am – 08:00 am Registration / Breakfast / Networking
08:00 am – 08:10 am Welcoming Remarks
Pat Limbach, VP Research (Univ. of Cincinnati)
08:10 am – 08:25 am Introduction, Meeting Goals, CHEST Value Proposition
J. M. Emmert (Univ. of Cincinnati)
08:25 am – 09:20 am NSF IUCRC Presentations
Behrooz Shirazi (NSF) and Lindsey McGowen (NC State)
09:20 am – 09:30 am Break / Networking
09:30 am – 10:30 am University of Cincinnati Project Proposal Presentations
J. M. Emmert (Univ. of Cincinnati)
Each project presentation will be 5-7 minutes long followed by 3-5 minutes for LIFE evaluation
P1: Asynchronous Design for Side Channel Avoidance
J. M. Emmert and Ranga Vemuri (UC)
P2: Connectionless RFID based Secure Supply Chain Management
Marten van Dijk and Ulrich Ruhrmair (UConn), J. M. Emmert and Carla Purdy (UC)
P3: Reverse Engineering Methodology for FPGA Bitstreams
James H. Lambert and Zachary A. Collier (UVa) and J. M. Emmert and Carla Purdy (UC)
P4: Additive Components for Hardware Integrity Monitoring
Rashmi Jha, Marc Cahay, and Punit Boochand  (UC)
P5: Hardware-Accelerated Tools for Trust
Ranga Vemuri and J. M. Emmert (UC)
P6: Efficient and Effective Defense against Cache Occupancy Attacks
Boyang Wang (UC)
10:30 am – 10:40 am Break / Networking
10:40 am – 11:20 am University of Virginia Project Proposal Presentations
James H. Lambert (Univ. of Virginia)
Each project presentation will be 5-7 minutes long followed by 3-5 minutes for LIFE evaluation
P7: Cost-effective resource allocation to portfolios of security measures for embedded devices in a large-scale system
James H. Lambert, Zachary A. Collier and Thomas Polmateer (UVa)
P8: Resilience of safety critical networks of interconnected IoT systems against attacks and failures
James H. Lambert, Zachary A. Collier and Thomas Polmateer (UVa)
P9: Risk tracking and management of embedded devices in the supply chain: Requirements, metrics, and performance monitoring
James H. Lambert, Zachary A. Collier and Thomas Polmateer (UVa)
P10: Trusted Enterprise Communications and Cyber-Physical Integration of Advanced Fleet Electrical Vehicle Chargers in a Mobile Electric Grid
James H. Lambert, Zachary A. Collier and Thomas Polmateer (UVa)
11:20 am – 12:00 pm Working Lunch / Networking
Box lunches will be provided
12:00 pm – 1:00 pm University of Texas at Dallas Project Proposal Presentations
Yiorgos Makris (Univ. of Texas at Dallas)
Each project presentation will be 5-7 minutes long followed by 3-5 minutes for LIFE evaluation
P11: CAD Flow Development for Design Obfuscation through Post-Fabrication Transistor-Level Programming (TRAP)
Yiorgos Makris, Carl Sechen, Benjamin Carrion Schaefer, and William Swarz (UTD)
P12: Design Obfuscation and Performance Locking Solutions for Analog/RF ICs
Yiorgos Makris, Ken O, and Andrew Marshall(UTD)
P13: Formal Security Evaluation of Executing Untrusted Binaries on Embedded Processors
Kevin Hamlen and Yiorgos Makris (UTD)
P14: Covert Channels in 5G Communications: Risks and Remedies
Aria Nosratinia, Yiorgos Makris (UTD)
P15: Stochasticity, Polymorphism and Non-Volatility: Three Pillars of Security and Trust Intrinsic to Emerging Technologies
Joseph Friedman and Yiorgos Makris (UTD)
P16: Designing Robust Hardware-Based Malware Detectors for the Internet of Things
Kanad Basu and Yiorgos Makris (UTD)
1:00 pm – 2:00 pm Poster Session I (P1-P16)
2:00 pm – 3:00 pm Northeastern University Project Proposal Presentations
Yunsi Fei (Northeastern Univ.)
Each project presentation will be 5-7 minutes long followed by 3-5 minutes for LIFE evaluation
P17: Side-channel and fault attacks on Deep Neural Networks
Yunsi Fei, Shelley Xue Lin, Thomas Wahl (NU)
P18: Secure design by RISC-V framework
Yunsi Fei (NU), David Kaeli (NU)
P19: Towards Trustworthy and Real-Time Deep Learning Execution on Mobile Platforms
Shelley Xue Lin, Yunsi Fei, Yanzhi Wang (NU)
P20: Microarchitecture vulnerability evaluation framework
David Kaeli, Yunsi Fei (NU)
P21: Feature Extraction based Identification and Mitigation of Denial-of-Sleep Attacks in Ultra-low Power IoT Devices
Aatmesh Shrivastava and Yunsi Fei (NU)
P22: Current Sensing Based On-chip Analog Trojan Detection Circuit Compatible with Chip Design and Validation Flow
Aatmesh Shrivastava and Yunsi Fei (NU)
3:00 pm – 3:10 pm Break / Networking
3:10 pm – 4:10 pm University of California at Davis Project Proposal Presentations
Houman Homayoun (Univ. of California at Davis)
Each project presentation will be 5-7 minutes long followed by 3-5 minutes for LIFE evaluation
P23: Cognitive Obfuscation: Securing Circuits by Graph Convolutional Networks
Houman Homayoun (UC Davis)
P24: High-Confidence Cyber-Physical Systems: The Case of Intelligible and Interpretable Machine Learning
Soheil Ghaisi (UC Davis)
P25: AMTRAC: Adversarial Machine Learning on Resource Provisioning Systems for Distributed Attacks on Cloud
Houman Homayoun and Soheil Ghaisi (UC Davis)
P26: CALTRAN: Customized Machine Learning-Based Side-Channel Attacks Detection and Light-weight Mitigation through Randomization
Houman Homayoun and Venkatesh Akella (UC Davis)
P27: A Neural Network Assisted Timing Profiling for Hardware Trojans Detection
Houman Homayoun (UC Davis)
P28: Preventing Side Channel Attack Epidemics in IoT Networks
Houman Homayoun (UC Davis)
4:10 pm – 4:20 pm Break / Networking (Setup for Poster Presentations)
4:20 pm – 5:20 pm University of Connecticut Project Proposal Presentations
John A. Chandy (Univ. of Connecticut)
Each project presentation will be 5-7 minutes long followed by 3-5 minutes for LIFE evaluation
P29: Embedded Systems Anti-Reverse Engineering using Transient Electronics
Lei Wang and John Chandy (UConn)
P30: GDI (Grow-Disperse-Inspect): A Novel Circuit Authentication Tag
A.F.M. Anwar (UConn)
P31: Memristor Degradation: An Indicator of Authentic AMS/RF and Digital Circuitry
A.F.M. Anwar (UConn)
P32: Leveraging Hardware Isolation for Secure Execution of Safety-Critical Applications in Distributed Embedded Systems
Omer Khan (UConn)
P33: A Framework for Smart Microsystems Security
Lei Wang (UConn)
P34: Development of Three Dimensional ID Tags and 3D Microscopy Reader for Hardware Security Authentication and Verification of Integrated Circuits and Systems
Bahram Javidi (UConn)
5:20 pm – 5:30 pm Review of evening and Day 2 activities
J.M. Emmert (Univ. of Cincinnati)
5:30 pm – 7:30 pm Technical Forum, Social, and Poster Session II (P17-P34)
Hors d’oeuvres and cocktails sponsored by the University of Cincinnati VP for Research (Pat Limbach), Dean of CEAS (John Weidner), and Dept of EECS (Marc Cahay)

Day 2:

07:00 am – 07:45 am Arrival and Breakfast (Networking)
07:45 am – 08:00 am Welcome back (Project Matrix)
J.M. Emmert (Univ. of Cincinnati)
08:00 am – 08:30 am AFRL Speaker
Len Orlando (AFRL/RYDT)
08:30 am – 08:45 am Tenet3 Capabilities for CHEST
Jeff Hughes (Tenet3)
08:45 am – 09:45 am LIFE FORM review and Discussion
NSF Evaluator Moderated (All participants) – break down into three groups:
Group 1: Projects P1 – P6
Group 2: Projects P7 – P10
Group 3: Projects P11 – P16
Group 4: Projects P17 – P22
Group 5: Projects P23 – P28
Group 6: Projects P29 – P34
09:45 am – 11:15 am Industry Workshop
(discussion of projects / ranking of projects / what else you want to see / written feedback)
Brian Dupaix and Len Orlando (AFRL)
11:15 am – 11:30 am Break / Networking
11:30 am – 11:45 am Remarks
John Weidner, Dean, College of Engineering and Applied Science (UC)
11:45 pm – 12:30 pm NSF Closed Session with Industry
12:30 pm – 12:35 pm Final Remarks and ADJOURN