Keynotes

Dan Stanzione

Managing Faults at Half a Million Cores - The Role of Fault Tolerance in Modern Supercomputing

Speaker: Dan Stanzione
Executive Director, Texas Advanced Computing Center
Associate Vice President for Research
The University of Texas at Austin

Dr. Dan Stanzione, Associate Vice President for Research at The University of Texas at Austin since 2018 and Executive Director of the Texas Advanced Computing Center (TACC) since 2014, is a nationally recognized leader in high performance computing. He is the principal investigator (PI) for a National Science Foundation (NSF) grant to deploy Frontera, which is the fastest supercomputer at any U.S. university. Stanzione is also the PI of TACC's Stampede2 and Wrangler systems, supercomputers for high performance computing and for data-focused applications, respectively. For six years he was co-PI of CyVerse, a large-scale NSF life sciences cyberinfrastructure. Stanzione was also a co-PI for TACC's Ranger and Lonestar supercomputers, large-scale NSF systems previously deployed at UT Austin. Stanzione received his bachelor's degree in electrical engineering and his master's degree and doctorate in computer engineering from Clemson University.

Ramesh Karri

Is Hardware the Next Frontier in Cybersecurity?

Speaker: Ramesh Karri
New York University


Integrated Circuit (IC) designers use third-party intellectual property (IP) cores in their designs. Further, they outsource the various steps in the IC design, manufacturing, testing and packaging flow. Such a globally distributed electronics supply chain is introducing security vulnerabilities in the ICs and the systems that use them. This is forcing IC designers and end-users to re-evaluate their trust in ICs. If an attacker gets hold of an unprotected IC, he can reverse engineer the IC and pirate the IP. Similarly, she can insert malicious circuits and backdoors into the IC.
In this talk I will outline High-Level Design for Trust techniques to prevent these and similar attacks: Locking/Obfuscation/Redaction and Secure Sourcing of IPs for High-Level Integration. Locking/Obfuscation implements a built-in obfuscation mechanism in ICs to prevent reverse engineering. Secure sourcing can thwart Trojan insertion in 3rd party Intellectual Properties. I will wrap up the presentation by pointing out why hardware security is an essential objective from economics, security, and safety aspects and offer my vision of the developing field of hardware cybersecurity.

Riccardo Locatelli

Trust dependable computing for autonomous systems

Speaker: Riccardo Locatelli
Intel Corporation


Edge applications for autonomous systems require high performance computation and augmented dependability. Silicon integrity is a key asset in this context and combined with system level ingredients it enables efficient HW/SW safety architectures.
This talk will present the safety architecture technologies and discuss the silicon integrity capabilities and features. Challenges and future main research directions will be presented.