The rapid proliferation of small unmanned aerial systems (drones) has fundamentally transformed low-altitude airspace, creating new opportunities in infrastructure inspection, disaster response, and commercial delivery — but also introducing serious risks to public safety, aviation operations, and critical infrastructure protection. Recent incidents involving unauthorized drone activity near airports, military installations, and sensitive facilities underscore the growing need for reliable airspace monitoring. Addressing these risks requires solutions that combine sensing technologies, dependable system design, and cybersecurity principles.
This half-day tutorial provides a comprehensive overview of modern airspace monitoring technologies and their associated cybersecurity implications. We examine sensing approaches ranging from traditional radar systems to emerging passive sensing techniques that leverage ambient radio-frequency (RF) signals and spaceborne transmitters — such as low-Earth-orbit (LEO) satellite constellations — as illuminators of opportunity. These passive approaches offer advantages including reduced cost, increased stealth, and improved scalability compared to active radar systems.
A central focus of the tutorial is the intersection between cybersecurity and safety in airspace monitoring. Detection infrastructures can themselves become targets of cyber attacks, including spoofing, signal injection, replay attacks, and adversarial evasion. We discuss these threat vectors in depth and examine how distributed sensing architectures can improve resilience and coverage. Through a real-world case study of passive sensing systems that leverage LEO satellite signals, we demonstrate how next-generation sensing networks can provide scalable and dependable airspace awareness.
Participants will gain a broad understanding of the technological landscape of drone detection, the cybersecurity challenges facing sensing infrastructures, and open research directions in dependable airspace monitoring.
Break (15 min)
Part 3 — Dependability and Safety (30 min)This tutorial targets researchers and practitioners working in cybersecurity, dependable systems, wireless sensing, critical infrastructure protection, and autonomous systems. The tutorial is designed to be accessible to participants without prior background in radar systems while still providing technical depth for experienced researchers.
The tutorial will be supported by presentation slides, a live demo, and selected experimental results from real-world passive sensing deployments using LEO satellite signals.
Section I: Fundamentals of Confidential Computing (1 hour)
Section II: Confidential Computing Platforms (1 hour)
CPU-CC: Intel TDXSection III: Research on Confidential Computing (1 hour)
Discussion of our recent CC research works from three perspectives:For the latest speaker list, bios, and abstracts, see the tutorial website: https://resist-tutorial.github.io/
Organizers: Peter W. Deutsch (MIT), Vincent Quentin Ulitzsch (MIT), Mengjia Yan (MIT), Sudhanva Gurumurthi (AMD), Vilas Sridharan (AMD), Harish Dixit (Meta), Sriram Sankar (Meta)
As process nodes shrink and datacenters scale toward exascale, Silent Data Corruptions (SDCs) have emerged as a primary challenge to computational integrity at scale. Once dismissed as rare anomalies, SDCs are now implicated in corrupted AI training weights, silent database corruptions, and elusive bugs that surface only after billions of compute-hours.
This full-day tutorial offers a cross-layer journey through the SDC landscape, led by academic and industry experts from AMD, Meta, and Google. We begin at the silicon level — examining the defects, variability, and aging phenomena at the root of these corruptions — then ascend through architectural mitigations, software-level testing and resilience, and finally workload behavior in distributed systems and large-scale AI. The tutorial bridges the dialogue between those who design silicon and those who manage the software running upon it, leaving attendees with a clear view of the open research questions that will define the next decade of reliable systems design.
Morning (3 hours)
Afternoon (3 hours)
Graduate students seeking a research area combining hardware, reliability, and systems; dependability researchers wishing to understand industrial hyperscaler constraints; and practitioners responsible for device and datacenter reliability. Basic knowledge of computer architecture and systems programming is expected.