Detailed Schedule-SPACE-2024
14th December, 2024 |
||
Time |
Event |
|
8.30 am -9.00 am |
Welcome and Registration |
|
9.00 am -9.30 am |
Welcome address, inaugural speech, felicitations, and a vote of thanks |
|
9.30 am-11 am |
Tutorial 1: New Era of Faults: Attacks, Tools and Countermeasures |
Workshop on FPGA based Hardware Accelerator for Elliptic Curve and Lattice Based Cryptography |
Speaker: Sayandeep Saha, IIT Bombay |
Speaker: Debapriya Basu Roy, IIT Kanpur |
|
11 am-11.30 am |
Tea Break |
|
11.30 am-1 pm |
Tutorial 2: Energy-Efficient ASIC Design for Cryptographic Hardware Acceleration |
Workshop on FPGA based Hardware Accelerator for Elliptic Curve and Lattice Based Cryptography |
Speaker: Utsav Banerjee, IISC Bangalore |
Speaker: Debapriya Basu Roy, IIT Kanpur |
|
1 pm-2 pm |
Lunch |
|
2 pm-3.30 pm |
Tutorial 3: A Brief History of ORAMs: From Theory to Practice |
|
Speaker: Adithya Vadapalli, IIT Kanpur |
||
3.30 pm-4 pm |
Tea Break |
|
4 pm-5.30 pm |
Tutorial 4: Securing the Heart of Hardware: A Tutorial on Design-Time Security Closure for Integrated Circuits |
|
Speaker: Johann Knechtel, NYU, Abu Dhabi |
15th December, 2024 |
||
Time |
Event |
|
8.30 am -9 am |
Registration |
|
9 am-9.30 am |
Conference Opening Session |
|
9.30 am-10.30 am |
Keynote 1:Online Testing Entropy and Entropy Tests with a Two State Markov Model |
|
Speaker:David Johnston, ex INTEL |
||
10.30 am-10.45 am |
Tea Break |
|
10.45 am-12.45 pm |
Paper Session 1: ML Security |
|
10.45-11.15 |
ML based Improved Differential Distinguisher with High Accuracy: Application to GIFT-128 and ASCON |
|
Authors: Tarun Yadav and Manoj Kumar (Defence Research and Development Organisation, India) |
11.15-11.45 |
DLShield: A Defense Approach against Dirty Label Attacks in Heterogeneous Federated Learning |
Authors: Sameera K M, Abhinav M, Amal P. P., Abhiram T Babu, Abishek Raj K, Amal Tomichen, Anaina P, Vinod P, Rafidha Rehiman K. A. and Mauro Conti (Cochin University of Science and Technology,India; University of Padua, Italy) |
||
11.45-12.15 |
Benchmarking Backdoor Attacks on Graph Convolution Neural Networks: A Comprehensive Analysis of Poisoning Techniques |
|
Authors: Rupesh Raj Karn and Ozgur Sinanoglu (New York University Abu Dhabi) |
||
12.15-12.30 |
BlockDoor: Blocking Backdoor Based Watermarks in Deep Neural Networks |
|
Authors: Yi Hao Puah, Anh Tu Ngo, Nandish Chattopadhyay and Anupam Chattopadhyay (NTU Singapore) |
||
12.30-12.45 |
Adversarial Malware Detection |
|
Authors:Ashish Vishwakarma, Umesh Kashyap and Sk Subidh Ali (IIT Bhilai) |
||
12.45 pm-2 pm |
Lunch |
|
2 pm-3 pm |
Keynote 2: TBD |
|
Speaker: Ulrich Rührmair, TU Berlin and University of Connecticut |
||
3 pm-3.15 pm |
Tea Break |
|
3.15 pm- 5 pm |
Paper Session 2: Homomorphic Encryption and Side Channel Attack |
|
3.15-3.45 |
Privacy-Preserving Graph-Based Machine Learning with Fully Homomorphic Encryption for Collaborative Anti-Money Laundering |
|
Authors: Fabrianne Effendi and Anupam Chattopadhyay (NTU Singapore) |
||
3.45-4.15 |
"There's always another counter": Detecting Micro-Architectural Attacks in a Probabilistically Interleaved Malicious/Benign Setting |
|
Authors: Upasana Mandal, Rupali Kalundia, Nimish Mishra, Shubhi Shukla, Sarani Bhattacharya and Debdeep Mukhopadhyay (IIT Kharagpur) |
||
4.15-4.30 |
Transferability of Evasion Attacks Against FHE Encrypted Inference |
|
Authors: Reeshav Chowdhury, Aman Kumar, Vaibhav Mohite and Ayantika Chatterjee (IIT Kharagpur) |
||
4.30-4.45 |
Security Analysis of ASCON Cipher under Persistent Faults |
|
Authors: Madhurima Das and Bodhisatwa Mazumdar (IIT Indore) |
||
4.45-5 |
SideLink: Exposing NVLink to Covert- and Side-Channel Attacks |
|
Authors: Issa Baddour, Dip Sankar Banerjee and Somitra Kumar Sanadhya (IIT Jodhpur) |
||
7 p.m. |
Gala Dinner and Cultural Event |
16th December, 2024 |
||
Time |
Event |
|
9.30 am-10.30 am |
Keynote 3: Physical Assurance for Advanced Packaging |
|
Speaker: Navid Asadi, University of Florida |
||
10.30 am-10.45 am |
Tea Break |
|
10.45 am-12.45 pm |
Paper Session 3: Advanced Cryptographic Primitives and IoT Security |
|
10.45-11.15 |
Post-Quantum Multi-Client Conjunctive Searchable Symmetric Encryption from Isogenies |
|
Authors: Sikhar Patranabis (IBM Research India) |
||
11.15-11.45 |
Faster and more Energy-Efficient Equation Solvers over GF(2) |
|
Authors: Subhadeep Banik and Francesco Regazzoni (University of Lugano, Switzerland; University of Amsterdam and Università della Svizzera italiana) |
||
11.45-12.15 |
Spatiotemporal Intrusion Detection Systems for IoT Networks |
|
Authors: Jonna Likith Sai, Souptik Majumder, Rohit Verma and Priyanka Bagade (IIT Kanpur) |
||
12.15 pm-2 pm |
Lunch |
|
2 pm- 3.20 pm |
Lightening Talk on Extended Abstracts |
|
2-2.10 |
Attacks and Countermeasures for Digital Microfluidic Biochips |
|
Authors: Navajit Singh Baban, Prithwish Basu Roy, Pauline John, Azhar Zam, Sukanta Bhattacharjee, Rafael Song, Ramesh Karri and Krishnendu Chakrabarty (New York University Abu Dhabi Division of Engineering; New York University Tandon School of Engineering; IIT Guwahati; Arizona State University,) |
||
2.10-2.20 |
CoPrIME: Complete Process Isolation using Memory Encryption |
|
Authors: Saltanat Firdous, Asutosh Brahma, Arjun Menon and Chester Rebeiro (IIT Madras,; Incore Semiconductors) |
||
2.20-2.30 |
High Speed High Assurance implementations of Multivariate Quadratic based Signatures |
|
Authors: Samyuktha M, Pallavi Borkar and Chester Rebeiro (IIT Madras; SETS Chennai)
|
||
2.30-2.40 |
FPGA-Based Acceleration of Homomorphic Convolution with Plaintext Kernels |
|
Authors: Rohith George Ninan and Kala S (IIIT Kottayam) |
||
2.40 pm-3.20 pm |
Poster Session and Tea Break |
|
FlashFuzz: A Format-Aware Fuzzing Framework for COTS Devices |
||
OMR : A comprehensive platform and suite of tools for malware research and analysis |
||
Faults in Neural Network Models |
||
3.20 pm -3.30 pm |
Award Ceremony |
|
3.30 pm onwards |
Local Place Visit Arranged by IIIT Kottayam |
17th December, 2024 |
|
Time |
Event |
9.30 am-10.30 am |
Keynote 4: Higher-Order Time Sharing Masking |
Benedikt Gierlichs, KU Leuven |
|
10.30 am-11 am |
Tea Break |
11.00 am-12.30 pm |
Tutorial 5: Micro-architectural Security and Trust: An Overview on Intel’s Trusted Domain Extensions |
Sarani Bhattacharya, IIT Kharagpur |
|
12.30 pm-1 pm |
Industry Track: Vehere |
1 pm- 2 pm |
Lunch |
2 pm-3 pm |
Industry Track: Nagaraju Kodalapura N (INTEL Corporation) |
3 pm-3.30 pm |
Tea Break |
3.30 pm-5 pm |
Tutorial 6: Counterfeit IC Detection and Avoidance |
Speaker: Domenic Forte, University of Florida |
|