SPACE 2025 Program

  • The complete SPACE 2025 program is now available!
  • Explore the full schedule of tutorials, sessions, keynotes, and special events to make the most of your conference experience.
  • Click the button below to download the program and start planning your participation in this exciting and insightful event.

📥 Download SPACE 2025 Program PDF

Program at a Glance

  • Tutorials on Microarchitecture/GPU, Firmware Reverse Engineering of IoT Devices, and Rust Programming Language
  • Keynote Talks, Research Paper Sessions, Industry Demos, and Workshops
  • Networking Events, Cultural Program & Gala Dinner
  • Campus Tour & Sports, Sightseeing Tour for participants

Full Conference Schedule

16.12.2025 (Day 1)

TimeEvent / Papers
8:30 AM - 9:00 AMRegistration
9:00 AM - 10:00 AMTutorial 1: Hardware Enhancements for Software Security – Chester Rebeiro, and Deepanjali S, IIT Madras
10:00 AM - 10:30 AMTea Break
10:30 AM - 12:00 PMTutorial 1: Hardware Enhancements for Software Security – Chester Rebeiro, and Deepanjali S, IIT Madras
12:00 PM - 1:30 PMLunch Break
1:30 PM - 3:00 PMTutorial 2: Firmware Reverse Engineering of IoT Devices – Santosh Sam Koshy, CDAC
3:00 PM - 3:30 PMTea Break
3:30 PM - 5:30 PMTutorial 2: Firmware Reverse Engineering of IoT Devices – Santosh Sam Koshy, CDAC

17.12.2025 (Day 2)

TimeEvent / Papers
8:30 AM to 10:00 AMCampus Tour & Sports
10:00 AM - 10:30 AMTea Break
10:30 AM - 12:00 PMTutorial 3: Rust Programming Language – Yashwanth Singh M , Bosch
12:00 PM - 1:30 PMLunch Break
1:30 PM - 3:00 PMTutorial 3: Rust Programming Language – Yashwanth Singh M, Bosch
3:00 PM - 3:30 PMTea Break
3:30 PM - 5:30 PMISEA Workshop on Quantum-Era Security – Workshop Chair: Anupam Chattopadhyay
6:00 PM - 8:00 PMNetworking Dinner

18.12.2025 (Day 3)

TimeEvent / Papers
8:30 AM - 9:00 AMGeneral Chairs' Introduction & TPC Chairs' Introduction
9:00 AM - 10:00 AMKeynote: Sandeep Shukla, IIIT Hyderabad – Session Chair: Chandan Karfa
10:00 AM - 10:30 AMTea Break
10:30 AM - 12:00 PM Session I: 4 Research Papers – Chair: Chandan Karfa
Paper ID: 15 - Analyzing Non-linear Shift Register Transformations in the Design and Cryptanalysis of Espresso - Anirban Ghatak, Anupam Chattopadhyay, Ambrish Awasthi and Indivar Gupta (ISI, Kolkata; SAG, DRDO, India; NTU, Singapore)
Paper ID: 29 - A keystream generator inspired by the experiment of drawing balls with replacement** - Ganesh Yellapu (Bharat Electronics Limited, Bangalore, India)
Paper ID: 82 - A new perspective on the decomposition in the Jacobian of small genus hyperelliptic curve - Deepak Bhati and Shashank Singh (CISPA Helmholtz; IISER Bhopal, India)
Paper ID: 66 - A Custom Entropy Harvester for Consistent Entropy Supply to the /dev/random** - Kunal Abhishek and Anuyog Chauhan (CDAC, Patna, India)
12:00 PM - 1:30 PMLunch Break
1:30 PM - 3:00 PMIndustry Demo & Poster Session
3:00 PM - 3:30 PMTea Break
3:30 PM - 5:30 PM Session II: 5 Research Papers – Chair: Urbi Chatterjee
Paper ID: 62 - High throughput 64-bit implementation of SNOW-V stream cipher** - Kakumani Kushalram, Majji Harsha Vardhan and Raghvendra Rohit (IIT Roorkee, India)
Paper ID: 99 - A Multi-View Contrastive Graph Neural Network Framework for Binary Malware Detection in IoMT environments** - Bhagyasri Bora, Saunav Barman, Rahul Bardhan, Dharitri Brahma and Amitava Nag (Central Institute of Technology, Kokrajhar, India)
Paper ID: 58 - Sample Similarity based Incremental Clustering: An Effective Methodology for Anomaly Detection in Networks - Arun K, Ardra V S and Aji S (University of Kerala, India)
Paper ID: 37 - Breaking PCB-Chain: A Side Channel Assisted Attack on IoT-Friendly Blockchain Mining - Shubhankar Gambhir, Vishesh Mishra, Urbi Chatterjee and Debapriya Basu Roy (IIT Kanpur, India)
Paper ID: 84 - Addressing Cache Side-Channel Attacks using Taint-guided Fine-grained Computation Offloading in Near-Memory Processing** - Simran Preet Kaur, Asutosh Kumar Sarma, Satanu Maity and Manojit Ghose (IIIT Guwahati, India)
6:00 PM - 8:00 PMCultural Program & Prize Distribution
8:00 PM - 9:00 PMGala Dinner

19.12.2025 (Day 4)

TimeEvent / Papers
8:30 AM - 9:00 AMRegistration
9:00 AM - 10:00 AMKeynote: Sikhar Patranabis, IBM – Session Chair: Debdeep Mukhopadhyay
10:00 AM - 10:30 AMTea Break
10:30 AM - 12:00 PM Session III: 4 Research Papers – Chair: Subhadeep Banik
Paper ID: 107 - PAC-Guided Design Strategies for Resilient Priority Arbiter PUFs - Durba Chatterjee, Simranjeet Singh, Debdeep Mukhopadhyay, Farhad Merchant and Anupam Chattopadhyay (Radboud University, Netherlands; Forschungszentrum Jülich, Germany; IIT Kharagpur, India; University of Groningen, Netherlands; NTU, Singapore)
Paper ID: 96 - Enhanced Hardware Trojan Detection with XGBoost Graph Learning: A Glass Box Approach - C Sneha and M Nirmala Devi (PES University, India)
Paper ID: 38 - MLP is better than ResNet on ANSSI’s Protected AES Implementation on ARM - Surya Prakash Mishra, Akash Gupta and Atul Prakash (SAG, DRDO, India; Ministry of Defense, India)
Paper ID: 90 - Hard-to-Find Bugs in Public-Key Cryptographic Software: Classification and Test Methodologies - Matteo Steinbach, Johann Groszschaedl and Peter Roenne (University of Luxembourg, Luxembourg)
12:00 PM - 1:30 PMLunch Break
1:30 PM - 3:00 PM Session IV: 4 Research Papers – Chair: Chester Rebeiro
Paper ID: 78 - Quantum Synthesis of Large S-Boxes: Heuristic and MILP-Based Transpiled-Depth Optimization - Tarun Yadav, Shweta Singh and Sudha Yadav (DRDO, India)
Paper ID: 76 - Toward Crypto Agility: Automated Analysis of Quantum-Vulnerable TLS via Packet Inspection - Subeen Cho, Yulim Hyoung, Hagyeong Kim, Minjoo Sim, Anupam Chattopadhyay, Hwajeong Seo and Hyunji Kim (Hansung University, S. Korea; NTU, Singapore)
Paper ID: 49 - Efficient Time Share Masking of AES - Subhadeep Banik and Francesco Regazzoni (University of Lugano, Switzerland; University of Amsterdam, Netherlands)
Paper ID: 21 - Secure Secret Sharing Protocol Against Network Data Remanence Side Channel Attacks - Prajwal Thakare, Akash Om Trivedi and Urbi Chatterjee (IIT Kanpur, India)
3:00 PM - 3:30 PMTea Break
3:30 PM - 5:30 PM Session V: 5 Research Papers – Chair: Debapriya Basu Roy
Paper ID: 70 - Investigation on the Impact of Practical Fault Model for Commercial Edge Machine Learning Devices - Shivam Bhasin, Dirmanto Jap, Marina Krček and Stjepan Picek (NTU, Singapore; Radboud University, Netherlands)
Paper ID: 53 - A Security Analysis of CNN Partitioning Strategies for Distributed Inference at the Edge - Fatemeh Mehrafrooz, Roozbeh Siyadatzadeh, Nele Mentens and Todor Stefanov (Leiden University, Netherlands; KU Leuven, Belgium)
Paper ID: 13 - GhostWriter: Exploiting GPU-Cache Contention to Steal and Steer Multi-Tenant Large-Language-Model Inference - Satyajit Das and Sreenath Vijayakumar (IIT Palakkad, India)
Paper ID: 80 - Gradient-Guided Adversarial Patch Attack for Deep Neural Networks - Rishav Kumar, Umesh Kashyap and Sk. Subidh Ali (IIT Bhilai, India)
Paper ID: 26 - VulScan-LT: A Lightweight Transformer-based Software Vulnerability Scanning Tool for Resource-Constrained Edge Devices - Dev Saini, Vivek Chaturvedi and Muhammad Shafique (IIT Palakkad, India; NYU Abu Dhabi, UAE)

20.12.2025 (Day 5)

TimeEvent
8:30 AM - 5:30 PMSightseeing Tour