posted by user: larryshi || 7179 views || tracked by 4 users: [display]

HASP 2014 : Workshop on Hardware and Architectural Support for Security and Privacy

FacebookTwitterLinkedInGoogle

Link: https://sites.google.com/site/haspworkshop2014/home
 
When Jun 15, 2014 - Jun 15, 2014
Where Minneapolis, MN
Submission Deadline Mar 17, 2014
Notification Due Apr 6, 2014
Final Version Due Apr 30, 2014
Categories    architecture   security   hardware   privacy
 

Call For Papers

===================================================================
The Third Workshop on Hardware and Architectural Support for Security and Privacy
In Conjunction with ISCA 41, June 15, 2014
Minneapolis, MN USA
Questions: haspworkshop2012@gmail.com
Website: http://sites.google.com/site/haspworkshop2014/
Submission: https://www.easychair.org/conferences/?conf=hasp2014
ISCA41: http://cag.engr.uconn.edu/isca2014/

CALL FOR PAPERS
===================================================================
Although much attention has been directed to the study of security at the system and the application level, security and privacy research focusing on hardware and architecture aspects remains a new frontier. In the era of cloud computing, pervasive intelligent systems, and nano-scale devices, practitioners and researchers have to address new challenges and requirements in order to meet the ever-changing landscape of security research and new demands from the consumers, enterprises, governments, and defense industry.

HASP is intended to bring together researchers, developers, and practitioners from academia and industry, to share practical implementations/experiences related to all aspects of hardware and architectural support for security and privacy, and to discuss future trends in research and applications. To that end, papers are solicited from the areas, including, but not limited to:

- Micro architectural and/or system support for privacy protection in the context of embedded systems, sensor networks, Internet-of-things, mobile devices, and cloud computing
- Hardware and architectural support for trust management
- Hardware and architectural support for digital rights management
- Hardware trojan threat evaluation, detection, and prevention
- Architectural and hardware techniques for supporting digital forensics
- Biometric hardware and implementation
- Electronic warfare and countermeasure techniques
- Side-channel exploits and modeling
- Attack resilient hardware and architectural design
- Hardware techniques for homeland security
- Cryptographic hardware design, implementation, and evaluation
- FPGA security
- Hardware backdoor and rootkits
- Embedded system security
- Hardware based electronic and digital spoofing attacks
- Interaction between system and micro-architecture
- Simulation, validation, and verification tools
- Analysis of real attacks and threat evaluation

SUBMISSION
===============================
Papers reporting original research results pertaining to the above and related topics are solicited. Full paper manuscripts must be in English of up to 8 pages.

All accepted and presented papers will be included in the ACM DL.
Please follow the instruction of the link:
http://www.acm.org/sigs/publications/proceedings-templates

IMPORTANT DATES
===============================
March 17, 2014: Submission deadline (tentative)
April 30, 2014: Camera-ready version (tentative)
June 15, 2014: Workshop

WORKSHOP ORGANIZERS
===============================
Ruby Lee, Princeton University
Weidong Shi University of Houston

Related Resources

S&P 2026   The 47th IEEE Symposium on Security and Privacy - First Deadline
ISPPAI 2026   2026 International Conference on Information Security, Privacy Protection and Artificial Intelligence-EI/Scopus
Privacy Symposium (PrivIno) 2026   International Conference on Data Governance, Regulatory Compliance, and Innovative Technologies
IJWesT 2026   International Journal of Web & Semantic Technology
AIBC--EI 2026   2026 7th International Artificial Intelligence and Blockchain Conference (AIBC 2026)
IJAIT 2026   International Journal of Advanced Information Technology
SRSE 2026   IEEE--2026 The 8th International Conference on System Reliability and Safety Engineering (SRSE 2026)
WIFS 2026   Workshop on Information Forensics and Security
ICITS--EI 2026   2026 The 14th International Conference on Information Technology and Science (ICITS 2026)
IJMPICT 2026   International Journal of Managing Public Sector Information and Communication Technologies