posted by organizer: gagosta || 451 views || tracked by 3 users: [display]

CS2 2018 : Fifth Workshop on Cryptography and Security in Computing Systems

FacebookTwitterLinkedInGoogle

Link: http://www.cs2.deib.polimi.it/
 
When Jan 24, 2018 - Jan 24, 2018
Where Manchester, UK
Submission Deadline Nov 17, 2017
Notification Due Dec 18, 2017
Final Version Due Dec 21, 2017
Categories    applied cryptography   embedded systems   security   secure hardware
 

Call For Papers

***********************************************************************
CS2 2018, CALL FOR PAPERS
Fifth Workshop on
Cryptography and Security in Computing Systems

Co-located with HiPEAC 2018 Conference, Manchester 24 January 2018
http://www.cs2.deib.polimi.it/
***********************************************************************

Important Dates:
* Paper Submission: November 17, 2017
* Acceptance Notification: December 18, 2017
* Camera Ready Version: December 21, 2017



Scope:
The wide diffusion of embedded systems, including multi-core,
many-core, and reconfigurable platforms, poses a number of challenges
related to the security of the operation of such systems, as well as
of the information stored in them.

Malicious adversaries can leverage unprotected communication to hijack
cyber-physical systems, resulting in incorrect and potentially highly
dangerous behaviours, or can exploit side channel information leakage
to recover secret information from a computing system. Untrustworthy
third party software and hardware can create openings for such
attacks, which must be detected and removed or countered.
The prevalence of multi/many core systems opens additional issues such
as NoC security. Finally, the complexity on modern and future embedded
and mobile systems leads to the need to depart from manual planning
and deployment of security features. Thus, design automation tools
will be needed to design and verify the security features of new
hardware/software systems.

The CS2 workshop is a venue for security and cryptography experts to
interact with the computer architecture and compilers community,
aiming at cross-fertilization and multi-disciplinary approaches to
security in computing systems.


Topics of interest include, but are not limited to:

* Compiler and Runtime Support for Security
* Cryptography in Embedded and Reconfigurable Systems
* Design Automation and Verification of Security
* Efficient Cryptography through Multi/Many core Systems
* Engineering and efficient implementation of post-quantum cryptographic
primitives
* Fault Attacks and Countermeasures, including interaction with
Fault Tolerance
* Hardware Architecture and Extensions for Cryptography
* Hardware/Software Security Techniques
* Hardware Trojans and Reverse Engineering
* Physical Unclonable Functions
* Privacy in Embedded Systems
* Security of Embedded and Cyberphysical Systems (Medical, Automotive,
Smartgrid, Industrial Control)
* Security of Networks-on-Chips and Multi-core Architectures
* Side Channel Attacks and Countermeasures
* Trusted computing


The workshop seeks submissions from academia and industry, presenting
novel research contributions and industrial case studies.


Submission Guidelines:
All submissions must be written in English. All papers will be double
blind refereed.
Regular submissions should be at most 6 pages in the ACM double-column
format including bibliography.
Please, use the following template when preparing your manuscript:
http://www.acm.org/sigs/publications/proceedings-templates
Authors must submit their papers (in PDF format) by the deadline
indicated above, using the EasyChair web site.


Publication:
Papers will be included in the ACM Digital Library, with a specific ISBN.
The proceedings will be indexed in Scopus.
At least one author of each accepted paper must register to the HiPEAC
conference, by the early date indicated by the organizers, and present
the paper.


Workshop Organizers:
Gerardo Pelosi, Politecnico di Milano, Italy
Giovanni Agosta, Politecnico di Milano, Italy
Alessandro Barenghi, Politecnico di Milano, Italy
Israel Koren, University of Massachussetts Amherst, USA


If you have any question,
please contact the program chair at cs2chair@polimi.it
HiPEAC 2018 home page: http://www.hipeac.net/conference

Related Resources

TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
ACIIDS 2018   10th Asian Conference on Intelligent Information and Database Systems
DSN 2018   The 48th IEEE/IFIP International Conference on Dependable Systems and Networks
IEEE Trans SUSC 2019   IEEE Trans on Sustainable Computing (SI: Intersection of Computing and Communication Technologies with Energy Systems)
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
ASYNC 2018   24st IEEE International Symposium on Asynchronous Circuits and Systems
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
AI 2017   3rd International Conference on Artificial Intelligence and Applications
DISC 2018   Special Issue on Data Intelligence in Sustainable Computing, Journal of Sustainable Computing: Informatics and Systems
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities