{"id":4368,"date":"2023-05-08T23:57:27","date_gmt":"2023-05-08T23:57:27","guid":{"rendered":"http:\/\/cad4security.org\/?page_id=4368"},"modified":"2023-06-01T15:51:10","modified_gmt":"2023-06-01T15:51:10","slug":"cad4sec-workshop-2023","status":"publish","type":"page","link":"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2023\/","title":{"rendered":"CAD4Sec Workshop 2023"},"content":{"rendered":"\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\"><nav class=\"is-responsive items-justified-center wp-block-navigation is-content-justification-center is-layout-flex wp-container-core-navigation-layout-1 wp-block-navigation-is-layout-flex\" aria-label=\"AICAD4Sec Workshop 2025\" \n\t\t\tdata-wp-interactive\n\t\t\tdata-wp-context='{\"core\":{\"navigation\":{\"overlayOpenedBy\":[],\"type\":\"overlay\",\"roleAttribute\":\"\",\"ariaLabel\":\"Menu\"}}}'\n\t\t><button aria-haspopup=\"true\" aria-label=\"Open menu\" class=\"wp-block-navigation__responsive-container-open \" \n\t\t\tdata-wp-on--click=\"actions.core.navigation.openMenuOnClick\"\n\t\t\tdata-wp-on--keydown=\"actions.core.navigation.handleMenuKeydown\"\n\t\t><svg width=\"24\" height=\"24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" aria-hidden=\"true\" focusable=\"false\"><rect x=\"4\" y=\"7.5\" width=\"16\" height=\"1.5\" \/><rect x=\"4\" y=\"15\" width=\"16\" height=\"1.5\" \/><\/svg><\/button>\n\t\t\t<div class=\"wp-block-navigation__responsive-container  \" style=\"\" id=\"modal-1\" \n\t\t\tdata-wp-class--has-modal-open=\"selectors.core.navigation.isMenuOpen\"\n\t\t\tdata-wp-class--is-menu-open=\"selectors.core.navigation.isMenuOpen\"\n\t\t\tdata-wp-effect=\"effects.core.navigation.initMenu\"\n\t\t\tdata-wp-on--keydown=\"actions.core.navigation.handleMenuKeydown\"\n\t\t\tdata-wp-on--focusout=\"actions.core.navigation.handleMenuFocusout\"\n\t\t\ttabindex=\"-1\"\n\t\t>\n\t\t\t\t<div class=\"wp-block-navigation__responsive-close\" tabindex=\"-1\">\n\t\t\t\t\t<div class=\"wp-block-navigation__responsive-dialog\" \n\t\t\tdata-wp-bind--aria-modal=\"selectors.core.navigation.ariaModal\"\n\t\t\tdata-wp-bind--aria-label=\"selectors.core.navigation.ariaLabel\"\n\t\t\tdata-wp-bind--role=\"selectors.core.navigation.roleAttribute\"\n\t\t\tdata-wp-effect=\"effects.core.navigation.focusFirstElement\"\n\t\t>\n\t\t\t\t\t\t\t<button aria-label=\"Close menu\" class=\"wp-block-navigation__responsive-container-close\" \n\t\t\tdata-wp-on--click=\"actions.core.navigation.closeMenuOnClick\"\n\t\t><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" width=\"24\" height=\"24\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M13 11.8l6.1-6.3-1-1-6.1 6.2-6.1-6.2-1 1 6.1 6.3-6.5 6.7 1 1 6.5-6.6 6.5 6.6 1-1z\"><\/path><\/svg><\/button>\n\t\t\t\t\t\t<div class=\"wp-block-navigation__responsive-container-content\" id=\"modal-1-content\">\n\t\t\t\t\t\t\t<ul class=\"wp-block-navigation__container is-responsive items-justified-center wp-block-navigation\"><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2025\/\"><span class=\"wp-block-navigation-item__label\">Home<\/span><\/a><\/li><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2025\/oc_workshop_2025\/\"><span class=\"wp-block-navigation-item__label\">Workshop Organizers<\/span><\/a><\/li><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2025\/speakers_25\/\"><span class=\"wp-block-navigation-item__label\">Speakers<\/span><\/a><\/li><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2025\/program\/\"><span class=\"wp-block-navigation-item__label\">Program<\/span><\/a><\/li><\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/nav><\/div><\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image alignwide size-large has-xl-margin-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"439\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/cfp-1024x439.jpg\" alt=\"\" class=\"wp-image-4370\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/cfp-300x129.jpg 300w, http:\/\/cad4security.org\/wp-content\/uploads\/cfp-768x330.jpg 768w, http:\/\/cad4security.org\/wp-content\/uploads\/cfp-1024x439.jpg 1024w, http:\/\/cad4security.org\/wp-content\/uploads\/cfp-1536x659.jpg 1536w, http:\/\/cad4security.org\/wp-content\/uploads\/cfp.jpg 1857w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>The emerging and ever-increasing security vulnerabilities in modern and complex hardware designs, such as SoC and complex microelectronics implementations, have been studied in recent years. Aggressive time-to-market, limited knowledge of designers in terms of security, and high cost of maintaining large team, establishing security metrics, etc have proven the need for automatic CAD solutions to aid assessment\/identifying\/mitigating SoC security vulnerabilities.<\/p>\n\n\n\n<p>In consideration of the above challenges and possible solutions and continuation of the 1st (inauguration) CAD4Sec workshop, which successfully held last year at DAC&#8217;59 with more than 80 attendees, we sketch out the extension of this community-wide event by inviting the experts from the industry (e.g., Google, Microsoft, Synopsys, Cadence, ARM, Intel, etc.), academia, and government (e.g., DARPA, AFRL, NAVY, etc. agencies) to expand the knowledge, to represent the need for, and to share the recent progress on the development of automatic security CAD solutions.&nbsp;<\/p>\n\n\n\n<p>The 2nd CAD4Sec workshop plan is also to extend the size and the involvement of practical demonstrations on the recent CAD for security tools by both industries\/academia. There will be a panel discussion consisting of experts in the field to talk about the roadmap for CAD for security development. In continuation to the 1st CAD4Sec workshop, the 2nd CAD4Sec workshop will contain several technical talks on the scope of metrics and CAD as the following:<\/p>\n\n\n\n<ul><li>CAD for Power\/Timing Side Channel Assessment<\/li><li>CAD for Timing Side Channel Assessment<\/li><li>CAD for Fault Injection Assessment<\/li><li>CAD for Electromagnetic Radiation Assessment<\/li><li>CAD for Security Property Generation<\/li><li>CAD for Security-oriented Equivalency Checking<\/li><li>CAD for Malicious Functionality<\/li><li>CAD for Security Monitoring and Validation<\/li><li>CAD for Security Verification of Advanced Packaging<\/li><li>CAD for Secure Heterogeneous Integration Assessment<\/li><li>CAD for Physical Probing Assessment<\/li><li>CAD for (Anti-)Reverse Engineering Assessment<\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The emerging and ever-increasing security vulnerabilities in modern and complex hardware designs, such as SoC and complex microelectronics implementations, have been studied in recent years. Aggressive time-to-market, limited knowledge of designers in terms of security, and high cost of maintaining large team, establishing security metrics, etc have proven the need for automatic CAD solutions to &hellip;<\/p>\n","protected":false},"author":8,"featured_media":2247,"parent":587,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"acf":[],"_links":{"self":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/4368"}],"collection":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/comments?post=4368"}],"version-history":[{"count":7,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/4368\/revisions"}],"predecessor-version":[{"id":4409,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/4368\/revisions\/4409"}],"up":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/587"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media\/2247"}],"wp:attachment":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media?parent=4368"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}