posted by organizer: djf4te || 1075 views || tracked by 4 users: [display]

ASHES 2021 : Fifth Workshop on Attacks and Solutions in Hardware Security


When Nov 19, 2021 - Nov 19, 2021
Where Seoul, South Korea
Submission Deadline Jul 23, 2021
Notification Due Aug 30, 2021
Final Version Due Sep 13, 2021
Categories    hardware security   fault injection   side channel analysis   anti-tamper

Call For Papers

Scope of ASHES
As in previous years, ASHES 2021 welcomes submissions on any aspect of hardware security, concerning both theory and practice. This includes, but is not limited to:
• Fault injection and countermeasures
• Side channels and countermeasures
• Hardware Trojans and countermeasures
• Tamper sensing and tamper protection
• New physical attack vectors or methods
• Biometrics
• Secure sensors and sensor networks
• Device fingerprinting and hardware forensics
• Emerging computing technologies in security
• Lightweight hardware solutions
• Secure implementation and secure design of cryptographic and security primitives
• Security analyses and security proofs for implementations and primitives
• Security of reconfigurable and adaptive hardware
• Post-quantum security
• New designs and materials in hardware security
• Nanophysics and nanotechnology in hardware security (“nano-security”)
• Physical unclonable functions and new/emerging variants thereof
• Unforgeable item tagging, secure supply chains, and hardware-based countermeasures against product piracy
• Efficient hardware implementation of cryptographic primitives
• Scalable hardware solutions for large numbers of players/endpoints
• Hardware security and machine learning: Secure hardware implementations of machine learning algorithms, machine learning in side-channel attacks, etc.
• Hardware security in emerging application scenarios: Internet of Things, smart home, automotive and autonomous systems, wearable computing, pervasive and ubiquitous computing, etc.
• (Physical) information leakage in the cloud
• Electronic voting machines
• Physical layer and wireless network security
• Anti-forensic attacks and protection (e.g., hardware virtualization and anti-forensic resilient memory acquisition)
• Architectural factors in hardware security, isolation versus encryption
• Secure hardware for multiparty computation
• Secure hardware in intellectual property and content protection
• Integration of hardware root of trust, such as random number generators and PUFs
• Quality metrics for secure hardware
• Conformance and evaluation of secure hardware
• Formal treatments, proofs, standardization, or categorization of hardware-related techniques (incl. surveys and systematization of knowledge papers)

Paper Categories
To account for the special nature of hardware security as a rapidly developing discipline, the workshop offers four different categories of papers:
• Full papers, with up to 10 pages in ACM double column format (including references and appendices), and a 20 min presentation timeslot at the workshop (including questions).
• Short papers, with up to 6 pages in ACM double column format (including references and appendices), and a 15 min presentation timeslot at the workshop (including questions).
• Wild and crazy (WaC) papers, with 3 to 6 pages in ACM double column format (excluding appendices and references), and 15 min presentation timeslot at the workshop (including questions). WaC papers are meant to target groundbreaking new methods and paradigms for hardware security. Their focus lies on novelty and potential impact, and on the plausibility of their argumentation, but not on a full demonstration or complete implementation of their ideas. They are reviewed and assessed as such. Wild and crazy papers must bear the prefix “WaC:” in their title from the submission onwards.
• Systematization of knowledge (SoK) papers, with up to 12 pages in ACM double column format (excluding appendices and references), and a 20 min presentation timeslot at the workshop (including questions). SoK papers shall evaluate, systematize, and contextualize existing knowledge. They should serve the community by fostering and structuring the development of a particular subarea within hardware security. Ideally, but not necessarily, they might provide a new view on an established, important subarea, support or challenge long-standing beliefs with compelling evidence, or present a convincing new taxonomy. They will be reviewed and assessed as such. Systematization of knowledge papers must bear the prefix “SoK:” in the title from the submission onwards.

Important Dates
• Paper submission deadline: June 25, 2021, 23:59:59 EDT
• Acceptance notification: August 13, 2021
• Camera-ready deadline: September 6, 2021

Conflicts of Interest
(Following the ACM SIGMOD 2021 CfP)
During submission of a research paper, the submission site will request information about conflicts of interest of the paper’s authors with program committee (PC) members. It is the full responsibility of all authors of a paper to identify all and only their potential conflict-of-interest PC members, according to the following definition. A paper author has a conflict of interest with a PC member if and only if one or more of the following conditions holds:
• The PC member is a co-author of the paper.
• The PC member has been a co-worker in the same company or university within the past two years.
• The PC member has been a collaborator within the past two years.
• The PC member is or was the author’s primary thesis advisor, no matter how long ago.
• The author is or was the PC member’s primary thesis advisor, no matter how long ago.
• The PC member is a relative or close personal friend of the author.
Papers with incorrect or incomplete conflict of interest information as of the submission closing time are subject to immediate rejection.

Related Resources

HOST 2023   IEEE International Symposium on Hardware Oriented Security and Trust (Submission Window 2)
ICHST 2023   2023 5th International Conference on Hardware Security and Trust (ICHST 2023)
IEEE Journal of Selected Topics in Appli 2023   Security and Privacy-preserving Solutions on Remote Sensing Data of Smart Cities
AsHES 2023   The Thirteenth International Workshop on Accelerators and Hybrid Exascale Systems
COSADE 2023   The 14th International Workshop on Constructive Side-Channel Analysis and Secure Design
IEEE CCNC STP-CPS 2023   5th International Workshop on Security Trust Privacy for Cyber-Physical Systems (STP-CPS'23) with IEEE CCNC 2023, 8-11 January, Las Vegas, NV, USA
SI on ATD&IS II 2023   Special Issue on Advanced Technologies in Data and Information Security II, Applied Sciences, MDPI
EICC 2023   European Interdisciplinary Cybersecurity Conference (EICC 2023)
IEEE ICISPP 2023   IEEE--2023 4th International Conference on Information Security and Privacy Protection (ICISPP 2023)
ICCCN 2023   The 32nd International Conference on Computer Communications and Networks