Registration


Please register for our workshop through the Form or 注册表.

Program


Time Duration Presentations
9:00 - 9:10 10mins Introduction
Session 1: Evaluation
9:10 - 10:00 50mins Keynote:
See me if you can? Red Bleed - making the invisible, visible
Prof. Chang Chip Hong, Nanyang Technological University, Fellow of IEEE & IET & AAIA
[Abstract] [Slides]
10:00 - 10:40 40mins Talk:
STALKER: A Framework to Analyze Fragility of Cryptographic Libraries under Hardware Fault Models
Prof. Zhang Fan (Terry), Zhejiang University
[Abstract] [Slides]
10:40 - 11:00 20mins Coffee Break
Session 2: Cryptography Primitives
11:00 - 11:40 40mins Talk:
Uniting Hardware Security_From Lightweight PUFs to Efficient Post-Quantum Cryptography
Prof. Cui Yijun, Nanjing University of Aeronautics and Astronautics (NUAA)
[Abstract] [Slides]
11:40 - 12:20 40mins Talk:
Practical PQC evaluations
Dr. Nikolaos-foivos POLYCHRONOU, Brightsight
[Abstract] [Slides]
Session 3: Protection
14:00 - 14:40 40mins Talk:
the ORSHIN project: Open-source ReSilient Hardware and software for Internet of thiNgs
Dr. Benedikt Gierlichs, KU Leuven
[Abstract] [Slides]
14:40 - 15:20 40mins Talk:
Integrating Cryptographic Hardware into All Chips: Some Trends and Challenges
Dr. Fan Junfeng, Open Security Research
[Abstract] [Slides]
15:20 - 15:40 20mins Coffee Break
15:40 - 16:20 40mins Talk:
Hardware Security Landscape in the age of AI
Dr. Zhang Xiaohu, Huawei
[Abstract] [Slides]
16:20 - 17:00 40mins Panel Discussion: How to win-win together between academia and industria?
All Speakers
17:00 - 17:10 10mins Closing remarks