SCCM 2019

Originally hosted at

Security for Custom Computing Machines

  • Date: Wednesday May 1, 2019
  • Time: 8:00 am – 12:15 pm
  • Location: CSE 1242
  • Organizers: Dustin Richmond (UW) and Ryan Kastner (UCSD)

Hardware security is an important design consideration. Recent events have raised awareness of security in general-purpose processors. As experts we must consider: What are equivalent equivalents for custom computing machines? How do we defend against threats that exist today? How do we design our systems to defend against future threats? This is increasingly important as we deploy custom computing machines at unprecedented scales.

Schedule (Preliminary):

8:00 Introduction
8:15 Matt French/Josh Monson (ISI)
8:30 Dustin Richmond (University of Washington)
Deploying Sensors in the Datacenter
8:45 David Kohlbrenner (UC Berkeley)
A Threat Model for Deploying Secure Hardware Elements on Untrusted FPGAs
9:00 Jeff Goeders (BYU)
Assurance of Trusted 3rd-Party IP for Modern FPGAs
9:15 Christophe Bobda (University of Florida)
System-Level Design of Secure System on Chip
9:30 Break-Out Session
10:00 Coffee Break
10:30 Alric Althoff (Leidos)
Quantifying System-Level Side-Channel Vulnerability
10:45 Aydin Aysu (NC State)
Physical Side-Channels Beyond Cryptography: Searching a New Horizon for Hardware Security
11:00 Nestan Tsiskaridze (UCSB)
Quantifying Arbitration Side Channels in FPGAs
11:15 Ryan Kastner (UCSD)
Security Verification for Heterogeneous Systems
11:30 Jonathan Valamehr (Tortuga Logic)
System-Level Security Verification Starts with the Hardware Root of Trust
11:45 Break-Out Session
12:15 Lunch