{"id":2245,"date":"2022-07-25T04:38:25","date_gmt":"2022-07-25T04:38:25","guid":{"rendered":"http:\/\/cad4security.org\/?page_id=2245"},"modified":"2022-09-24T03:55:38","modified_gmt":"2022-09-24T03:55:38","slug":"cad4sec-workshop-2022","status":"publish","type":"page","link":"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2022\/","title":{"rendered":"CAD4Sec Workshop 2022"},"content":{"rendered":"<nav class=\"is-responsive items-justified-center wp-block-navigation is-content-justification-center is-layout-flex wp-container-core-navigation-layout-1 wp-block-navigation-is-layout-flex\" aria-label=\"CAD4Sec Workshop 2022\" \n\t\t\tdata-wp-interactive\n\t\t\tdata-wp-context='{\"core\":{\"navigation\":{\"overlayOpenedBy\":[],\"type\":\"overlay\",\"roleAttribute\":\"\",\"ariaLabel\":\"Menu\"}}}'\n\t\t><button aria-haspopup=\"true\" aria-label=\"Open menu\" class=\"wp-block-navigation__responsive-container-open \" \n\t\t\tdata-wp-on--click=\"actions.core.navigation.openMenuOnClick\"\n\t\t\tdata-wp-on--keydown=\"actions.core.navigation.handleMenuKeydown\"\n\t\t><svg width=\"24\" height=\"24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" aria-hidden=\"true\" focusable=\"false\"><rect x=\"4\" y=\"7.5\" width=\"16\" height=\"1.5\" \/><rect x=\"4\" y=\"15\" width=\"16\" height=\"1.5\" \/><\/svg><\/button>\n\t\t\t<div class=\"wp-block-navigation__responsive-container  \" style=\"\" id=\"modal-1\" \n\t\t\tdata-wp-class--has-modal-open=\"selectors.core.navigation.isMenuOpen\"\n\t\t\tdata-wp-class--is-menu-open=\"selectors.core.navigation.isMenuOpen\"\n\t\t\tdata-wp-effect=\"effects.core.navigation.initMenu\"\n\t\t\tdata-wp-on--keydown=\"actions.core.navigation.handleMenuKeydown\"\n\t\t\tdata-wp-on--focusout=\"actions.core.navigation.handleMenuFocusout\"\n\t\t\ttabindex=\"-1\"\n\t\t>\n\t\t\t\t<div class=\"wp-block-navigation__responsive-close\" tabindex=\"-1\">\n\t\t\t\t\t<div class=\"wp-block-navigation__responsive-dialog\" \n\t\t\tdata-wp-bind--aria-modal=\"selectors.core.navigation.ariaModal\"\n\t\t\tdata-wp-bind--aria-label=\"selectors.core.navigation.ariaLabel\"\n\t\t\tdata-wp-bind--role=\"selectors.core.navigation.roleAttribute\"\n\t\t\tdata-wp-effect=\"effects.core.navigation.focusFirstElement\"\n\t\t>\n\t\t\t\t\t\t\t<button aria-label=\"Close menu\" class=\"wp-block-navigation__responsive-container-close\" \n\t\t\tdata-wp-on--click=\"actions.core.navigation.closeMenuOnClick\"\n\t\t><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" width=\"24\" height=\"24\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M13 11.8l6.1-6.3-1-1-6.1 6.2-6.1-6.2-1 1 6.1 6.3-6.5 6.7 1 1 6.5-6.6 6.5 6.6 1-1z\"><\/path><\/svg><\/button>\n\t\t\t\t\t\t<div class=\"wp-block-navigation__responsive-container-content\" id=\"modal-1-content\">\n\t\t\t\t\t\t\t<ul class=\"wp-block-navigation__container is-responsive items-justified-center wp-block-navigation\"><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2022\/\"><span class=\"wp-block-navigation-item__label\">Home<\/span><\/a><\/li><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2022\/people\/\"><span class=\"wp-block-navigation-item__label\">Program Committee<\/span><\/a><\/li><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2022\/speakers\/\"><span class=\"wp-block-navigation-item__label\">Speakers<\/span><\/a><\/li><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2022\/program\/\"><span class=\"wp-block-navigation-item__label\">Detailed Program &amp; Slides<\/span><\/a><\/li><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2022\/gallery\/\"><span class=\"wp-block-navigation-item__label\">Gallery<\/span><\/a><\/li><\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/nav>\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image alignwide size-large has-xl-margin-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"493\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/Head_2_workshop-1024x493.jpg\" alt=\"\" class=\"wp-image-1543\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/Head_2_workshop-300x144.jpg 300w, http:\/\/cad4security.org\/wp-content\/uploads\/Head_2_workshop-768x370.jpg 768w, http:\/\/cad4security.org\/wp-content\/uploads\/Head_2_workshop-1024x493.jpg 1024w, http:\/\/cad4security.org\/wp-content\/uploads\/Head_2_workshop-1536x740.jpg 1536w, http:\/\/cad4security.org\/wp-content\/uploads\/Head_2_workshop.jpg 1759w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Vulnerabilities in SoCs are due to design mistakes, lack of security understandings, design transformations, various attack surfaces, and malicious intents. Further, exiting CAD tools are used in SoC design flow can introduce additional vulnerabilities in the SoCs unintentionally. Not only will these vulnerabilities move from one level of abstraction to another, but unique vulnerabilities can also be introduced during design transformations. Therefore, it is essential to have automatic CAD solutions to be able to analyze the security of SoCs in a comprehensive manner, in all levels of abstractions, and against all existing threats (e.g., fault-injection, side-channel, and hardware Trojan attacks). CAD tools should be able to access the security of the design in the pre-silicon stage and suggest possible countermeasures while still it is possible to modify the design and address the potential vulnerabilities.<\/p>\n\n\n\n<p>Considering the above challenges and potential solutions, CAD4Seccuirty workshop co-locates with ACM\/IEEE DAC 2021 conference and includes experts from industry (like Synopsys, Cadence, Google, Analog Devices, Mentor Graphics, etc.), academia, and government (like DARPA, NAVY, AFRL, etc. agencies) to shed light on the need for and the recent progress on the development of automatic security CAD solutions in all levels of design abstractions. The workshop will include demos on the recent CAD for security tools to detect various vulnerabilities. There will be a panel consists of experts in the field to talk about the road map for CAD for security development. The CAD4Sec workshop will contain several technical talks on the scope of metrics and CAD as the following:<\/p>\n\n\n\n<ul><li>CAD for power-side channel vulnerability assessment<\/li><li>CAD for timing-side channel vulnerability assessment<\/li><li>CAD for electromagnetic radiation vulnerability assessment<\/li><li>CAD for fault-injection vulnerability evaluation<\/li><li>CAD for automatic security property generation<\/li><li>CAD for security equivalence checking between different design abstractions<\/li><li>CAD for security equivalence checking between different SoCs<\/li><li>CAD for Optical\/microprobing\/nanoprobing probing for assurance<\/li><li>CAD for (Anti-)Reverse engineering and physical attacks<\/li><li>CAD for FPGA Bitstream protection and vulnerabilities<\/li><li>CAD for Trojans and backdoors: Detection and prevention<\/li><li>CAD for physical assurance<\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Vulnerabilities in SoCs are due to design mistakes, lack of security understandings, design transformations, various attack surfaces, and malicious intents. Further, exiting CAD tools are used in SoC design flow can introduce additional vulnerabilities in the SoCs unintentionally. Not only will these vulnerabilities move from one level of abstraction to another, but unique vulnerabilities can &hellip;<\/p>\n","protected":false},"author":8,"featured_media":2247,"parent":587,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"acf":[],"_links":{"self":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/2245"}],"collection":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/comments?post=2245"}],"version-history":[{"count":9,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/2245\/revisions"}],"predecessor-version":[{"id":2413,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/2245\/revisions\/2413"}],"up":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/587"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media\/2247"}],"wp:attachment":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media?parent=2245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}