posted by user: gagosta || 7261 views || tracked by 21 users: [display]

CS2 2014 : First Workshop on Cryptography and Security in Computing Systems

FacebookTwitterLinkedInGoogle

Link: http://www.cs2.deib.polimi.it/
 
When Jan 20, 2014 - Jan 20, 2014
Where Vienna
Submission Deadline Oct 27, 2013
Notification Due Nov 29, 2013
Final Version Due Dec 15, 2013
Categories    embedded systems   security   cryptography   computer architecture
 

Call For Papers

***********************************************************************
CS2 2014, CALL FOR PAPERS
First Workshop on
Cryptography and Security in Computing Systems

Co-located with HiPEAC 2014 Conference, Vienna 20 January 2014
http://www.cs2.deib.polimi.it/
***********************************************************************

Important Dates:
* Paper Submission: October 27, 2013 - 11:59 PM (UTC)
* Acceptance Notification: November 29, 2013
* Camera Ready Version: December 15, 2013


Scope:
The wide diffusion of embedded systems, including multi-core,
many-core, and reconfigurable platforms, poses a number of challenges
related to the security of the operation of such systems, as well as
of the information stored in them.

Malicious adversaries can leverage unprotected communication to hijack
cyber-physical systems, resulting in incorrect and potentially highly
dangerous behaviours, or can exploit side channel information leakage
to recover secret information from a computing system. Untrustworthy
third party software and hardware can create openings for such
attacks, which must be detected and removed or countered.
The prevalence of multi/many core systems opens additional issues such
as NoC security. Finally, the complexity on modern and future embedded
and mobile systems leads to the need to depart from manual planning
and deployment of security features. Thus, design automation tools
will be needed to design and verify the security features of new
hardware/software systems.

The CS2 workshop is a venue for security and cryptography experts to
interact with the computer architecture and compilers community,
aiming at cross-fertilization and multi-disciplinary approaches to
security in computing systems.


Topics of interest include, but are not limited to:

* Compiler and Runtime Support for Security
* Cryptography in Embedded and Reconfigurable Systems
* Design Automation and Verification of Security
* Efficient Cryptography through Multi/Many core Systems
* Fault Attacks and Countermeasures, including interaction with
Fault Tolerance
* Hardware Architecture and Extensions for Cryptography
* Hardware/Software Security Techniques
* Hardware Trojans and Reverse Engineering
* Physical Unclonable Functions
* Reliability and Privacy in Embedded Systems
* Security of Cyber-Physical Systems
* Security of Networks-on-Chips and Multi-core Architectures
* Side Channel Attacks and Countermeasures
* Trusted computing

The workshop seeks submissions from academia and industry, presenting
novel research contributions and industrial case studies.


Submission Guidelines:
All submissions must be written in English. All papers will be double
blind refereed.
Regular submissions should be at most 6 pages in the ACM double-column
format including bibliography.
Please, use the following template when preparing your manuscript:
http://www.acm.org/sigs/publications/proceedings-templates
Authors must submit their papers (in PDF format) by the deadline
indicated above, using the EasyChair web site:
https://www.easychair.org/conferences/?conf=cs22014.


Publication:
Papers will be included in the ACM Digital Library, with a specific ISBN.
At least one author of each accepted paper must register to the HiPEAC
conference, by the early date indicated by the organizers, and present
the paper.


Workshop Organizers:
Israel Koren, University of Massachussetts Amherst, USA
Gerardo Pelosi, Politecnico di Milano, Italy
Giovanni Agosta, Politecnico di Milano, Italy
Alessandro Barenghi, Politecnico di Milano, Italy



If you have any question,
please contact the program chair at cs2-2014@easychair.org
HiPEAC 2014 home page: http://www.hipeac.net/conference

Related Resources

Elec-SI-IIDS 2021   Special Issue on Design of Intelligent Intrusion Detection Systems
MathSJ 2020   Applied Mathematics and Sciences: An International Journal
Sensors (MDPI) 2020   Special Issue on Security, Trust and Privacy in New Computing Environments
IJCIS 2020   International Journal on Cryptography and Information Security
Sensors (MDPI) SI 2021   Sensors SI on Security, Trust and Privacy in New Computing Environments
SPTM 2021   9th International Conference of Security, Privacy and Trust Management
ICPR-IETBiom-VSaaS 2021   25th ICPR Special Issue on Real-Time Visual Surveillance as-a-Service (VSaaS) for Smart Security Solutions in IET Biometrics
Spec.Issue on Social Informatics: Scopus 2021   Journal of Social and Business Informatics - Acta Informatica Pragensia
SI on IoT for Fighting COVID-19   CFP - Special Issue on IoT for Fighting COVID-19 [PMC, Elsevier]
ITE 2021   2nd International Conference on Integrating Technology in Education