Time | ||
---|---|---|
09:00 | Opening and Workshop Introduction | |
09:15 | Invited Talk: The Case for System Integrity Monitors based on A Hardware Memory Snooper Prof. Brent Byunghoon Kang (KAIST) |
|
10:15 | Break (Coffee) | |
10:45 | BugsBunny: Hopping to RTL Targets with a Directed
Hardware-Design Fuzzer Hany Ragab, Koen Koning, Cristiano Giuffrida and Herbert Bos |
|
11:15 | Invited Talk: Hardware-assisted memory
protection Dr. Jan-Erik Ekberg (Huawei) |
|
12:15 | Break (Lunch) | |
13:30 | Invited Talk: Principled foundations for microarchitectural security Prof. Marco Guarnieri (IMDEA) |
|
14:30 | Work in progress: A formally verified shadow stack for
RISC-V Matthieu Baty, Guillaume Hiet and Pierre Wilke |
|
15:00 | Break (whatever) | |
15:15 | Invited Talk: Configuring Security for Intermittent Computing Dr. Archanaa Krishnan (Texas Instruments) |
|
16:15 | Break (Coffee) | |
16:30 | BEERR: Bench of Embedded system Experiments for
Reproducible Research Paul Olivier, Huy Ngo Xuan and Aurélien Francillon |
|
17:00 | Short Talks and Discussion
|
|
18:00 | Closing Remarks |