ICHSA 2021 Conference Program
All times are Jerusalem Standard Time (UTC+0300)
Registration is now closed - thank you!
Monday 31/May
| Time | Speaker | Title |
|---|---|---|
| 14:00 | Valentin Peltier | Fault Injection Workshop |
| 14:30 | ” | |
| 15:00 | ” | |
| 15:30 | Break | |
| 16:00 | Aurélien Louvet | Fault Injection Workshop |
| 16:30 | ” | |
| 17:00 | ” | |
| 17:30 | Break | |
| 18:00 | Yaakov Cohen | CTF Opens |
Tuesday 1/Jun
| Time | Speaker (Plenary) | Title | Speaker (Breakout) |
|---|---|---|---|
| 12:00 | Conference Luncheon | ||
| 12:30 | ” | ||
| 13:00 | Organizers | Opening Statements | Cohen (CTF) |
| 13:15 | Yuval Yarom | Science, Intelligent Design, and the Holy Book video | Cohen (CTF) |
| 13:45 | Christina Pöpper | Timeless Timing Attacks video | Yarom |
| 14:15 | Eyal Ronen | Student Competition | Pöpper |
| 15:00 | Break+DJ | Students | |
| 15:30 | Daniel Gruss | Inspectre Gadget: Connecting the Dots between Prefetch, Meltdown, and Foreshadow video | |
| 16:00 | JV Rajendran | Swatting the Hardware Security Bugs video | Gruss |
| 16:30 | Elad Peer | Industry Panel | Rajendran |
| 17:00 | ” | ||
| 17:30 | Networking Outdoors |
Wednesday 2/Jun
| Time | Speaker (Plenary) | Title | Speaker (Breakout) |
|---|---|---|---|
| 12:00 | Conference Luncheon | ||
| 12:30 | ” | ||
| 13:00 | Ingrid Verbauwhede | Secure Hardware Design: Starting from the Roots of Trust video | Cohen (CTF) |
| 13:30 | Stjepan Picek | Challenges in the Deep Learning-based Side-channel Analysis video | Verbauwhede |
| 14:00 | Sylvain Guilley | Security analysis tools against cyber-physical attacks video | Picek |
| 14:30 | Aviv Barkai | Security and Safety: How can two walk together, except they be agreed (Amos 3:3) video | Guilley |
| 15:00 | Break+DJ | Barkai | |
| 15:30 | Travis Goodspeed | Some In-Band Signaling Tricks for Hardware Radios video | |
| 16:00 | Kang Wang | IoT PUF or: How I Learned to Stop Worrying and Love Security Research video | |
| 16:30 | Antriksh Shah | Building Hardware Security Communities | Wang |
| 17:00 | Daniel Genkin | CacheOut: Leaking Data on Intel CPUs via Cache Evictions | Shah |
| 17:30 | Organizers | Awards and Closing Statements | Genkin |
| 17:45 | Networking Outdoors | ||
| 18:30 | Networking Dinner for Women in Hardware Security |