Invited Panels

  • Hardware Security: Myth or Reality? ACM/IEEE System Level Interconnect Prediction Workshop (SLIP), June 4, 2016
  • Hardware IP Protection Through Invasive and Non-Invasive Analysis IEEE Symposium on Hardware Oriented Security and Trust (HOST), May 5, 2016
  • Cyber Physical Systems Security: What Are the Challenges and best Practices? Florida Institute for Cybersecurity Research: Annual Conference on Cybersecurity, February 9, 2016
  • ATARC Visionary Panel - Mobile Technology of the Future, ATARC Federal Mobile Computing Summit, August 12, 2015
  • Hacking Things: Security and Privacy Challenges in Internet of Things, IEEE Conference on Communication and Network Security (CNS), September 28, 2015

Invited Talks

  • Texas Instrument, Dallas, TX July 2017
    Title: "Security Challenges for SoC Designs in Internet of Things Era" (Host: Christy She)
  • IEEE International Workshop on Design Automation for Cyber-Physical Systems, Austin, TX June 2017
    Title: "Security and Privacy Challenges in Internet of Things" (Host: Xin Li)
  • Warren B. Nelms Institute for the Connected World (Opening Ceremony), University of Florida, Gainesville, FL April 2017
    Title: "Security and Privacy Challenges in Internet of Things" (Host: John Harris)
  • Notre Dame University, Notre Dame, IN February 2017
    Title: "Internet of Things Design and Security from a Cross-Layer Perspective" (Host: Sharon Hu)
  • Texas A & M University, College Station, TX February 2017
    Title: "Internet of Things Design and Security from a Cross-Layer Perspective" (Host: Alex Sprintson)
  • Cisco, Gainesville, FL February 2017
    Title: Internet of Things (IoT): Design and Security" (Host: Yousef Iskander)
  • University of Florida, Gainesville, FL January 2017
    Title: "Internet of Things Design and Security from a Cross-Layer Perspective" (Host: William Eisenstadt)
  • Florida Security Workshop, Tampa, FL December 2016
    Title: "IoT Security Training Platforms for Professionals and Engineers" (Host: Simon Ou)
  • Florida Center of Cybersecurity, Tampa, FL October 2016
    Title: "Demonstration: Trusted CPS Platform Development"
  • University of George, Athens, GA September 2016
    Title: "IoT Security: From a Cross-Layer Perspective" (Host: Kang Li)
  • EDA Workshop, Hong Kong, China August 2016
    Title: "Arm-Race on Logic Obfuscation and IC Camouflaging for IP Protection" (Host: Zili Shao)
  • Air Force Research Lab (AFRL), Rome NY August 2016
    Title: "Security Challenges in CPS and IoT: from End-Node to the System" (Host: Charles Kamhoua and Kevin Kwiat)
  • Syracuse University, Syracuse, NY July 2016
    Title: "Security Vulnerability Database for IoT" (Host: Yanzhi Wang)
  • International Workshop on Hardware Security, Beijing, China June 2016
    Title: "Hardware's Active Role in Cybersecurity" (Host: Xiaoxiao Wang)
  • University of Delaware, Newark, DE May 2016
    Title: "Introduction to Hardware Security: Past, Current and Future" (Host: Chengmo Yang)
  • The 4th Asia Workshop on Smart Sensor System (AWSSS 2016), Beijing, China March 2016
    Title: "Security and Privacy in IoT Era: From Attack to Defense'' (Host: Yongpan Liu)
  • FICS Annual Conference on Cybersecurity, Gainesville, FL Feb 2016
    Title: "IoT Security: From Hacking to Defense" (Host: Mark Tehranipoor and Patrick Traynor)
  • Cisco, Gainesville, FL Dec 2015
    Title: "Remote Assessment for IoT Security: Tools, Metrics, and Test Platforms" (Host: Bill Eklow)
  • National Institute of Standards and Technology (NIST), Gainesville, FL Dec 2015
    Title: "Remote Assessment for IoT Security: Tools, Metrics, and Test Platforms" (Host: Donna Dodson)
  • University of Texas, San Antonio, San Antonio, TX Nov 2015
    Title: "Security and Privacy on IoT and Wearable Devices" (Host: Jianwei Niu)
  • China Internet Security Conference (Keynote Speech), Beijing, China Sep 2015
    Title: "Smart vs. Security: IoT Security and Protections"
  • ARO Workshop on Cryptography and Hardware Security for the Internet of Things, College Park, MD Oct 2015
    Title: "Case study on IoT Device Security and Privacy"
  • Notre Dame University, Notre Dame, IN Sep 2015
    Title: "Introduction to Hardware Security - Formal Methods, IoT Security, and Reverse Engineering" (Host: X. Sharon Hu)
  • NIST - Cybersecurity Innovation Forum, Washington DC, Sep 2015
    Title: “Hardware Trust and Integrity: The First Step Toward Securing Computer Systems" (Host: Andrew Regenscheid)
  • Cisco, Gainesville, FL Sep 2015
    Title: "IoT Security" (Host: Tony Jeffs)
  • National Security Campus - Florida Institute of Cyber Security, Gainesville, FL Aug 2015
    Title: “Introduction to Hardware Security - Formal Methods, IoT Security, and Reverse Engineering” (Host: Perry Tapp)
  • Honeywell - Florida Institute of Cyber Security, Gainesville, FL Jun 2015
    Title: “IoT/Hardware Security” (Host: Mark Tehranipoor)
  • Raytheon - Florida Institute of Cyber Security, Gainesville, FL Jun 2015
    Title: “Automated Functionality Rebuilding Through Netlist Reverse Engineering” (Host: Mark Tehranipoor)
  • Trustworthy Hardware Workshop, New York, NY Nov 2014
    Title: Computer System Protection through Run-time Hardware-Software Collaboration,” (Host: Ramesh Karri)
  • University of Georgia, Athens, GA Sep 2014
    Title: “Computer System Protection through Hardware-Software Collabora tion” (Host: Kang Li)
  • Pennsylvania State University, State College, PA Sep 2014
    Title: “Computer System Protection through Run-Time Hardware-Software Collaboration” (Host: Vijaykrishnan Narayanan)
  • University of Connecticut, Storrs, CT Aug 2014
    Title: “Embedded System Security in Smart Consumer Electronics: A Case Study on Google Nest Thermostat” (Host: Domenic Forte)
  • Information Sciences Institute/USC, Washington D.C. May 2014
    Title: “Security in Silicon - Challenges and Opportunities Ahead” (Host: Youn- gok Pino)
  • Intel Corp., Hillsboro, OR Nov 2013
    Title: “Proof-Carrying Based Trusted Embedded System Design and Secure SoC Integration” (Host: David Ott and Mukesh Ranjan)
  • Trustworthy Hardware Workshop, New York, NY Nov 2013
    Title: “Trusted Embedded System Design Through the Unification of Trusted Third-Party Software Programs and Hardware IP Cores” (Host: Cliff Wang)
  • Northeastern University, Boston, MA Apr 2012
    Title: “Trusted Integrated Circuits” (Host: Edmund Yeh)
  • University of New Mexico, Albuquerque, NM Apr 2012
    Title: “Trusted Integrated Circuits” (Host: Nasir Ghani)
  • Stony Brook University, New York, NY Apr 2012
    Title: “Trusted Integrated Circuits” (Host: Kenneth Short)
  • University of Maryland, College Park, MD Mar 2012
    Title: “Trusted Integrated Circuits” (Host: Gang Qu)
  • George Mason University, Fairfax, VA Mar 2012
    Title: “Trusted Integrated Circuits” (Host: Kris Gaj)
  • Illinois Institute of Technology, Chicago, IL Mar 2012
    Title: “Trusted Integrated Circuits” (Host: Kui Ren)
  • Intel Corp., Hillsboro, OR Jan 2012
    Title: “Trusted Integrated Circuits and Proof Carrying-based Hardware Intellectual Property Protection” (Host: Dhinesh Manoharan)