| Title | Author |
| A2: Analog Malicious Hardware | Kaiyuan Yang |
| Aker: A Design and Verification Framework for Safe and Secure SoC Access Control | Andy Meza |
| An Analysis of Speculative Type Confusion Vulnerabilities in the Wild | Adam Morrison |
| CaSA: End-to-end Quantitative Security Analysis of Randomly Mapped Caches | Yuheng Yang |
| FPGA-Based Remote Power Side-Channel Attacks | Mark Zhao |
| Keystone: An Open Framework for Architecting Trusted Execution Environments | David Kohlbrenner |
| Make Some Noise. Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis | Shivam Bhasin |
| Microarchitectural Attack Synthesis with Happens-Before Analysis | Caroline Trippel |
| No-FAT: Architectural Support for Low Overhead Memory Safety Checks | Miguel Arroyo |
| Stealthy Tracking of Autonomous Vehicles with Cache Side Channels | Mulong Luo |