Linked Presentation: GhostTouch: Targeted Attacks on Touchscreens without Physical TouchTheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable VulnerabilitiesV'CER: Efficient Certificate Validation in Constrained NetworksFLAME: Taming Backdoors in Federated Learning