2019 International Conference On Computer Aided Design

The Premier Conference Devoted to Technical Innovations in Electronic Design Automation

November 4-7, 2019The Westin Westminster Westminster, CO

v class="event-details"> MP Associates, Inc.

TUESDAY November 06, 4:15pm - 6:15pm | Riveria

Build a Fort: Designing and Assessing Secure Architectures
Nektarios Tsoutsos - Univ. of Delaware
Fixing the security bugs post-deployment is impractical. This section explores novel solutions in assessing the security of a design and building secure architectures, which can be leveraged during design time. The first paper strengthens high-level synthesis tools to verify security properties. The second paper speeds up hardware security verification. The third paper builds a trusted architecture for heterogeneous systems. The final paper utilizes split manufacturing to thwart Trojans.

7C.1High-Level Synthesis With Timing-Sensitive Information Flow Enforcement
 Speaker: Zhenghong Jiang - Cornell Univ.
 Authors: Zhenghong Jiang - Cornell Univ.
Steve Dai - Cornell Univ.
Edward Suh - Cornell Univ.
Zhiru Zhang - Cornell Univ.
7C.2Property Specific Information Flow Analysis for Hardware Security Verification
 Speaker: Armaiti Ardeshiricham - University of California San Diego
 Authors: Wei Hu - Northwestern Polytechnical Univ.
Armaiti Ardeshiricham - University of California San Diego
Mustafa Gobulukoglu - University of California San Diego
Xinmu Wang - Northwestern Polytechnical Univ.
Ryan Kastner - Univ. of California, San Diego
7C.3HISA: Hardware Isolation-Based Secure Architecture for CPU-FPGA Embedded Systems
 Speaker: Mengmei Ye - University of Nebraska-Lincoln
 Authors: Mengmei Ye - University of Nebraska-Lincoln
Xianglong Feng - University of Nebraska-Lincoln
Sheng Wei - University of Nebraska-Lincoln
7C.4SWAN: Mitigating Hardware Trojans With Design Ambiguity
 Speaker: Todd Austin - Univ. of Michigan
 Authors: Timothy Linscott - Univ. of Michigan
Valeria Bertacco - Univ. of Michigan
Todd Austin - Univ. of Michigan