Program
Time | Duration | Presentations | ||
---|---|---|---|---|
9:00 - 9:10 | 10mins | Introduction | ||
Session 1: Evaluation | ||||
9:10 - 10:00 | 50mins | Keynote: See me if you can? Red Bleed - making the invisible, visible Prof. Chang Chip Hong, Nanyang Technological University, Fellow of IEEE & IET & AAIA |
[Abstract] | [Slides] |
10:00 - 10:40 | 40mins | Talk: STALKER: A Framework to Analyze Fragility of Cryptographic Libraries under Hardware Fault Models Prof. Zhang Fan (Terry), Zhejiang University |
[Abstract] | [Slides] |
10:40 - 11:00 | 20mins | Coffee Break | ||
Session 2: Cryptography Primitives | ||||
11:00 - 11:40 | 40mins | Talk: Uniting Hardware Security_From Lightweight PUFs to Efficient Post-Quantum Cryptography Prof. Cui Yijun, Nanjing University of Aeronautics and Astronautics (NUAA) |
[Abstract] | [Slides] |
11:40 - 12:20 | 40mins | Talk: Practical PQC evaluations Dr. Nikolaos-foivos POLYCHRONOU, Brightsight |
[Abstract] | [Slides] |
Session 3: Protection | ||||
14:00 - 14:40 | 40mins | Talk: the ORSHIN project: Open-source ReSilient Hardware and software for Internet of thiNgs Dr. Benedikt Gierlichs, KU Leuven |
[Abstract] | [Slides] |
14:40 - 15:20 | 40mins | Talk: Integrating Cryptographic Hardware into All Chips: Some Trends and Challenges Dr. Fan Junfeng, Open Security Research |
[Abstract] | [Slides] |
15:20 - 15:40 | 20mins | Coffee Break | ||
15:40 - 16:20 | 40mins | Talk: Hardware Security Landscape in the age of AI Dr. Zhang Xiaohu, Huawei |
[Abstract] | [Slides] |
16:20 - 17:00 | 40mins | Panel Discussion: How to win-win together between academia and industria? All Speakers |
||
17:00 - 17:10 | 10mins | Closing remarks |