posted by organizer: skoteshwara || 2248 views || tracked by 4 users: [display]

ZTHA 2022 : Zero Trust Hardware Architectures Workshop@ICCAD 2022


When Nov 3, 2022 - Nov 3, 2022
Where Virtual Workshop
Submission Deadline Sep 26, 2022
Notification Due Oct 24, 2022
Final Version Due Oct 31, 2022
Categories    hardware security   cloud computing   edge computing   computer architecture

Call For Papers

Zero Trust Hardware Architectures
Co-located with 2022 International Conference on Computer-Aided Design (ICCAD)
Thursday, November 3, 2022
Virtual Workshop


In recent times, there has been a major push and urgency to adopt the zero-trust model for cybersecurity. The zero-trust model is based on the principle of “never trust, always verify” and is aimed at eliminating all implicit trust in a system. While adopting a zero-trust model, the underlying hardware needs to be trusted and secured as well. Thus, novel approaches for building zero trust architectures, from systems all the way down to silicon, is one of the big challenges for next generation hardware system design.
Traditionally, research on establishing trust and security in hardware has primarily focused on the host and its associated memory subsystems. However, in modern system architectures such as edge/cloud computing, composable systems and chiplet based integrated circuits, the realm of trust needs to be extended beyond the host system and incorporate many hardware devices and IPs. In view of threats such as compromised supply chain integrity, counterfeit chips, hardware trojan implants, malicious firmware, malware, etc., it is important to establish trust in hardware components and to communicate trust between different components of a system. Thus, a new set of protocols that can work to establish trust and security in these new types of system architectures has become necessary. The focus of this workshop will be on all aspects of security and trust required to create zero-trust hardware architectures for heterogeneous computing systems.

The areas of interest include but are not limited to:
• Roots of Trust and Chain of Trust in hardware
• Link encryption and secure communication channels
• Extending Trusted execution environments to peripherals
• Authentication, Attestation and Encryption in Chiplet based designs
• Authentication, Attestation and Encryption in Composable system architectures
• Hardware based access control and monitoring
• Measuring trust in hardware and systems
• Hardware-based security techniques in edge/cloud systems
• Supply chain security
Important dates:
• Paper Submission Deadline: September 26, 2022 (AOE)
• Notification: October 24, 2022
• Camera-Ready: October 31, 2022
• Virtual Workshop: November 3, 2022
We welcome four types of submissions: Technical papers with evaluation results, Position papers on directions for research and development, Review papers and Talk abstract (1 page) that describes the content of an oral presentation. Each paper must be 4-6 pages. All accepted papers will be invited to present at the workshop. For more details, please visit the workshop website.

EasyChair link:
Sandhya Koteshwara, Mengmei Ye and Hubertus Franke, IBM Research, USA

Related Resources

ICHST--Ei 2024   2024 6th International Conference on Hardware Security and Trust (ICHST 2024)
COMIT 2024   8th International Conference on Computer Science and Information Technology
ASAP 2024   Application-Specific Systems, Architectures, and Processors
IC2E 2024   12th IEEE International Conference on Cloud Engineering
ICHST 2024   2024 6th International Conference on Hardware Security and Trust (ICHST 2024)
ICCIA 2024   2024 9th International Conference on Computational Intelligence and Applications (ICCIA 2024)
DaMoN 2024   20th International Workshop on Data Management on New Hardware
IOTCB 2024   3rd International Conference on IOT, Cloud and Big Data
HOST 2024   IEEE International Symposium on Hardware Oriented Security and Trust
IJCSES 2024   International Journal of Computer Science and Engineering Survey