TUESDAY June 26, 10:30am - 12:00pm | Room 2012
TOPIC AREA: SECURITY/PRIVACY, EDA
KEYWORD: TEST & VERIFICATION, CONTESTS
EVENT TYPE: DESIGNER TRACK INVITED

SESSION 16
Hack@DAC: Techniques for Finding Security Vulnerabilities in an SoC
Chair:
Jeyavijayan (JV) Rajendran - Texas A&M Univ., College Station, TX
Co-Chair:
Ahmad-Reza Sadeghi - Technische Univ. Darmstadt, Germany
Organizers:
Jeyavijayan (JV) Rajendran - Texas A&M Univ., College Station, TX
Daniel Holcomb - Univ. of Massachusetts, Amherst, MA
Siddharth Garg - New York Univ., New York, NY
Ahmad-Reza Sadeghi - Technische Univ. Darmstadt, Germany
This session will present a set of novel approaches for discovering security vulnerabilities in SoC designs. System-on-a-Chip (SoC) designers use third-party or in-house intellectual property cores to design SOCs. Trustworthiness of such SoCs is undermined by security-critical bugs in IPs or integration. When exploited, a bug may result in a deadlock or failure of the system or create a backdoor allowing the attacker to gain remote access to the system so as to leak secrets from it. The research community has struggled with the problem of developing approaches and computer-aided tools to design trust-worthy SoCs. The talks in this special session will present technical details of SoC security-enhancement techniques that have been evaluated against a common set of industry-provided benchmark designs in the 2018 Hack@DAC security competition. Hack@DAC includes a live one-day hacking competition at the conference where these techniques will be applied in a live-scoring capture-the-flag type event.

Thank You to Our Designer Track Sponsor:


16.1A Buggy SoC Framework for Security Assurance Research –Hack@DAC 2018 Case Study
 Speakers: Hareesh Khattri - Intel Corp., Hillsboro, OR
Arun Kanuparthi - Intel Corp., Hillsboro, OR
 Authors: Arun Kanuparthi - Intel Corp., Hillsboro, OR
Hareesh Khattri - Intel Corp., Hillsboro, OR
16.2Finalist team 1 from 2018 Hack@DAC presents their approach - Hackin' Aggies
 Speaker: Michael Quinn - Texas A&M Univ., College Station, TX
 Authors: Michael Quinn - Texas A&M Univ., College Station, TX
Sheena Goel - Texas A&M Univ., College Station, TX
Zhiyang Ong - Texas A&M Univ., College Station, TX
Saumil Gogri - Texas A&M Univ., College Station, TX
Bhavani Bedre Shankar - Texas A&M Univ., College Station, TX
16.3Finalist team 2 from 2018 Hack@DAC presents their approach - TRELA
 Speaker: Yiorgos Makris - Univ. of Texas at Dallas, Richardson, TX
 Authors: Yiorgos Makris - Univ. of Texas at Dallas, Richardson, TX
Mohammad-Mahdi Bidmeshki - Univ. of Texas at Dallas, Richardson, TX
Liwei Zhou - Univ. of Texas at Dallas, Richardson, TX
Monir Zaman - Univ. of Texas at Dallas, Richardson, TX
Yunjie Zhang - Univ. of Texas at Dallas, Richardson, TX
16.4Finalist team 3 from 2018 Hack@DAC presents their approach - TPTSIC
 Speaker: Sumanta Chaudhuri - Télécom ParisTech, Paris, France
 Authors: Sumanta Chaudhuri - Télécom ParisTech, Paris, France
Michael Timbert - Télécom ParisTech, Paris, France
Xuan Thuy Ngo - Secure-IC SAS, Paris, France
Sylvain Guilley - Télécom ParisTech, Paris, France
16.5Finalist team 4 from 2018 Hack@DAC presents their approach - Dallas Bugboys
 Speaker: Benjamin Carrion Schaefer - Univ. of Texas at Dallas, Richardson, TX
 Authors: Benjamin Carrion Schaefer - Univ. of Texas at Dallas, Richardson, TX
Siyuan Xu - Univ. of Texas at Dallas, Richardson, TX
Jianqi Chen - Univ. of Texas at Dallas, Richardson, TX