W04 6th Workshop on Design Automation for Understanding Hardware Designs (DUHDE6)

Printer-friendly versionPDF version
Date: 
2019-03-29
Time: 
08:30-17:30
Location / Room: 
TBA

Organisers

Christian Krieg, Vienna University of Technology, AT (Contact Christian Krieg)
Oliver Keszöcze, Friedrich-Alexander-Universität Erlangen-Nürnberg, DE (Contact Oliver Keszöcze)

Programme Committee Members

Maciej Ciesielski, University of Massachusetts, US (Contact Maciej Ciesielski)
Azadeh Davoodi, University of Wisconsin - Madison, US (Contact Azadeh Davoodi)
Görschwin Fey, Technische Universität Hamburg, DE (Contact Görschwin Fey)
Tara Ghasempouri, Tallinn University of Technology, EE (Contact Tara Ghasempouri)
Ian Harris, University of Californa Irvine, US (Contact Ian Harris)
Jan Malburg, German Aerospace Center, DE (Contact Jan Malburg)
Heinz Riener, EPFL, CH (Contact Heinz Riener)
Jannis Germany Stoppe, DFKI GmbH, DE (Contact Jannis Germany Stoppe)
Pramod Subramanyan, Indian Institute of Technology Kanpur, IN (Contact Pramod Subramanyan)
Georg Weissenbacher, Vienna University of Technology, AT (Contact Georg Weissenbacher)
Clifford Wolf, Symbiotic EDA, AT (Contact Clifford Wolf)
Cunxi Yu, EPFL, CH (Contact Cunxi Yu)

Understanding a hardware design can be a tough process. When entering a large team as a new member, when extending a legacy design, or when documenting a new design, a lack in understanding the details of a design is a major obstacle for productivity. In software engineering, topics like software maintenance, software understanding or reverse engineering are well established in the research community and partially tackled by tools. In the hardware area, the re-use of IP-blocks, the growing size of designs and design teams leads to similar problems. Understanding of hardware requires deep insight into concurrently operating units, optimizations to reduce the required area, and specially tailored functional units for a particular use. In hardware security, it is vital to verify properties for security-critical paths of a design, which includes to fully understand a design pre- and post-synthesis.

Topics

The workshop focus includes but is not limited to the following topics in design understanding:

  • Design descriptions from the formal specification level (FSL) to electronic system level(ESL) down to register transfer level (RTL)

  • Extraction of high-level properties

  • Knowledge extraction from design structures at any level of abstraction

  • Feature localization: Localization of code implementing specialized functionality

  • Data/Control path extraction

  • Reverse engineering

  • Innovative GUIs for design and verification

  • Analysis of interaction between hardware and software

  • Metrics for (open-source) intellectual property (IP) cores

  • Formal methods for design understanding

  • Machine learning for design understanding

  • Future applications of design understanding

Submissions may be extended abstracts of 2 pages or full papers of 6 pages in IEEE or ACM conference style. Informal proceedings will be distributed electronically. Please submit your contributions at: https://www.softconf.com/date19/DUHDe

Agenda

TimeLabelSession
08:30W04.3Workshop opening

Organisers:
Christian Krieg, TU Wien, AT, Contact Christian Krieg
Oliver Keszöcze, Friedrich-Alexander-Universität Erlangen-Nürnberg, DE, Contact Oliver Keszöcze


Workshop opening

08:45W04.4Invited talk -- Burcin Cakir, Princeton University: Addressing Integrated Circuit Integrity Using Statistical Analysis and Machine Learning Techniques

Speaker:
Burcin Cakir, Princeton University, US, Contact Burcin Cakir


Bio:

Burcin Cakir received her B.S. degree from Electrical Engineering Department of Bilkent University, and her Ph.D. degree from Princeton University. Her research motivation is formulating models that can represent real systems accurately and express mathematical bases/frameworks for further analysis. She had experience in developing algorithms and analyses to help design secure hardware systems. She is a recipient of Francis Robbins Upton Fellowship award from Princeton University. Her work on Hardware Trojan detection received Best Paper Award at DATE Conference (2015). She also has served as a referee on various journals and conferences and gave workshop and seminar talks. Besides her work at Princeton, she also had experience in industry research with two internships at Microsoft Research (MSR) in Redmond and Cambridge Labs.

10:30W04.6Paper presentation block 2

Moderators:
Christian Krieg, TU Wien, AT, Contact Christian Krieg
Oliver Keszöcze, Friedrich-Alexander-Universität Erlangen-Nürnberg, DE, Contact Oliver Keszöcze

13:00W04.8Invited talk -- Pramod Subramanyan, Indian Institute of Technology, Kanpur: Reverse Engineering for Security: Views From the Top and the Bottom.

Moderators:
Christian Krieg, TU Wien, AT, Contact Christian Krieg
Oliver Keszöcze, Friedrich-Alexander-Universität Erlangen-Nürnberg, DE, Contact Oliver Keszöcze

Speaker:
Pramod Subramanyan, Indian Institute of Technology Kaipur, IN, Contact Pramod Subramanyan


Abstract:

Recent years have seen much hand-wringing about security concerns posed by malicious hardware designs. Seemingly at the other end of the spectrum are inadvertent hardware design flaws that lead to security breaches. The former concern has led to development of algorithmic reverse engineering techniques, Hardware Trojan detection algorithms and side-channel analysis algorithms -- all of which aim to algorithmically discover malicious behavior from the bottom up. The latter concern has led to the progress in top-down security verification techniques based on model checking and syntax-guided synthesis. In this talk, I will try to review some recent progress in both top-down and bottom-up analysis. I will argue that both top-down and bottom-up techniques can synergistically benefit each other.

Bio:

Pramod Subramanyan is an Assistant Professor in the Department of Computer Science and Engineering at the Indian Institute of Technology, Kanpur. He obtained his Ph.D. from Princeton University and subsequent to his Ph.D., he was a postdoctoral scholar at the University of California, Berkeley. His research interests lie at the intersection of systems security and formal methods. His current research is focused on system-building techniques that can provide verifiable guarantees of security. Pramod's research has won several awards including the Best Paper Award at the ACM Computer and Communication Security conference, the ACM SIGDA Outstanding Ph.D. Dissertation in Electronic Design Automation Award, the Best Student Paper Award at IEEE Symposium on Hardware-Oriented Security and Trust.

14:00W04.9Paper presentation block 3

Moderators:
Christian Krieg, TU Wien, AT, Contact Christian Krieg
Oliver Keszöcze, Friedrich-Alexander-Universität Erlangen-Nürnberg, DE, Contact Oliver Keszöcze

15:00W04.11Invited talk 3: TBA

Moderators:
Christian Krieg, TU Wien, AT, Contact Christian Krieg
Oliver Keszöcze, Friedrich-Alexander-Universität Erlangen-Nürnberg, DE, Contact Oliver Keszöcze

16:00W04.12Paper presentation block 4

Moderator:
Christian Krieg, TU Wien, AT, Contact Christian Krieg

Chair:
Oliver Keszöcze, Friedrich-Alexander-Universität Erlangen-Nürnberg, DE, Contact Oliver Keszöcze

07:30W04.1Registration Desk opens
08:30W04.2Workshops start
10:00W04.5Coffee break 1
12:00W04.7Lunch break
14:30W04.10Coffee break 2
17:30W04.13Workshops end