posted by user: yukohara || 30 views || tracked by 1 users: [display]

HS3 2025 : HS3 2025: 1st Workshop on Hardware-Supported Software Security

FacebookTwitterLinkedInGoogle

Link: https://hs3-workshop.github.io/2025.html
 
When Sep 25, 2025 - Sep 25, 2025
Where Toulouse, France
Submission Deadline May 21, 2025
Notification Due Jun 15, 2025
Final Version Due Jun 27, 2025
Categories    cybersecurity   hardware   software
 

Call For Papers


******************************************************************************
Call for Papers

HS3 2025: 1st Workshop on Hardware-Supported Software Security
Thursday, September 25 2025, Toulouse (France)
https://hs3-workshop.github.io/2025.html

Co-located with ESORICS 2025: https://esorics2025.sciencesconf.org/
******************************************************************************

The HS3 workshop seeks to share experience, tools and methodology on
hardware-assisted software security. We are looking forward to submissions
that propose new architectures offering better resilience against software
attacks. These architectures should rely on hardware-based security
mechanisms to protect the software stack. One of the challenges is to
formally specify and verify the security guarantees offered by such
architectures and to better assess the security guarantees provided by
existing hardware architectures against software attacks, especially
attacks against micro-architecture. This can be achieved by identifying new
vulnerabilities using reverse engineering, fuzzing or other attack
approaches. The goal of the HS3 workshop is to provide a forum for
researchers and practitioners from academia, industry and government that
work on hardware-assisted software security. HS3 2025 has a special theme
on "Secure Monitoring, Intrusion Detection, and Incident Response" and we
are specifically looking forward to submissions that present
hardware-assisted approaches in this domain.

=== Special Theme: Secure Monitoring, Intrusion Detection, and Incident Response

Intrusion Detection System have become ubiquitous cybersecurity tools that
monitor network traffic or other system activity to then identify anomalous
behaviour or policy violations. Upon detection, these systems may alert
security teams or central security systems, reporting potential threats, or
even trigger automated responses. For this year's edition of the HS3
workshop, we especially encourage submissions that investigate questions
regarding the hardware-supported design of such systems. We are
specifically interested in submissions in the area of secure monitoring,
intrusion detection, and incident response, and we seek to develop a
special track, potentially with invited talks or panel discussions, on this
domain.

==== Topics of interest include, but are not limited to the following

* Hardware-based security mechanisms
* Hardware-assisted and secure system monitoring
* Hardware-assisted intrusion detection and reaction
* Hardware-assisted privacy and anonymity
* Hardware enclaves and Trusted Execution Environments
* Security co-processors
* Leveraging hardware features at the software level (e.g. compiler, OS)
for security
* Hardware/software contracts for security
* Formal methods applied to the hardware-assisted security
* Hardware trace mechanisms for security
* OS and VM introspection
* Software side-channel attacks
* Software attacks against micro-architecture
* Software-activated fault attacks

==== Important Dates

* Submission: May 21, 2025 -- 11:59pm AoE
* Author Notification: June 15, 2025
* Camera Ready Version: June 27, 2025
* Workshop: September 25, 2025

==== Submission and Publication

There are two categories of submissions:

1. Regular papers describing fully developed work and complete results (20
pages, references included, LNCS format)
2. Short papers, position papers, industry experience reports, work-in-
progress submissions and ideas (10 pages, references included, LNCS
format; work-in-progress and idea submissions should clearly outline the
research hypothesis, evaluation strategy and potential impact)

All papers must be written in English and describe original work that has
not been published or submitted elsewhere. The submission category (regular
paper, short paper, special theme) should be clearly indicated. Members of
the The Program Committee will fully review all submissions. Papers will
be published by Springer in the Lecture Notes in Computer Science (LNCS)
series. Contact the Program Chairs if you do not want your *short paper* to
appear in the proceedings.

Papers must be typeset in LaTeX using the LNCS template:
https://www.springer.com/gp/computer-science/lncs/conference-proceedings-guidelines
Failure to adhere to the page limit and formatting requirements can be
grounds for rejection.

For accepted papers, at least one author must attend the workshop.

==== Program Chairs

* Guillaume Hiet, IRISA, CentraleSupelec/Inria, France (co-chair)
* Yuko Hara, Institute of Science, Tokyo, Japan (co-chair)
* Jan Tobias Muehlberg, Universite Libre de Bruxelles, Belgium (co-chair)

* Iness Ben Guirat, Universite Libre de Bruxelles
* Pascal Cotret, ENSTA Bretagne
* Kevin Cheang, University of California, Berkeley
* Chris Dalton, HP Labs
* Merve Gülmez, Ericsson Research/KU Leuven
* Vianney Lapôtre, Univ. South Brittany
* Clémentine Maurice, CNRS
* Maria Méndez Real, Université Bretagne Sud
* Kaveh Razavi, ETH Zurich
* Shweta Shinde, ETH Zurich
* Volker Stolz, HVL
* Pierre Wilke, CentraleSupélec/Inria

* Contact email: hs3-workshop@inria.fr

Related Resources

DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
Ei/Scopus-CCISS 2025   2025 2nd International Conference on Computing, Information Science and System (CCISS 2025)
No Hat 2025   No Hat - COMPUTER SECURITY CONFERENCE
IEEE-EI/Scopus-AEMCSE 2025   2025 8th International Conference on Advanced Electronic Materials, Computers and Software Engineering-EI/Scopus
ADIP--EI 2025   2025 7th Asia Digital Image Processing Conference (ADIP 2025)
SI - AI&Cyber - Applied Sciences (MDPI) 2025   Special Issue on Artificial Intelligence and Cybersecurity: Challenges and Opportunities
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ICITA 2025   19th International Conference on Information Technology and Applications
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
IJESA 2025   International Journal of Embedded Systems and Applications