posted by organizer: djf4te || 165 views || tracked by 2 users: [display]

ASHES 2018 : Second Workshop on Attacks and Solutions in Hardware Security


When Oct 19, 2018 - Oct 19, 2018
Where Toronto, CA
Submission Deadline Jul 8, 2018
Notification Due Sep 5, 2018
Final Version Due Sep 19, 2018
Categories    hardware security   cryptography   IOT   nanotechnology

Call For Papers


We are happy to announce the Second Workshop on Attacks and Solutions in Hardware Security (ASHES 2018), a post-conference workshop of ACM CCS 2018, one of the premier computer security conferences, in Toronto, Canada.

ASHES deals with any aspects of hardware security, and welcomes any contributions in this area. Among others, it particularly highlights emerging techniques and methods as well as recent application areas within the field. This includes new attack vectors, novel designs and materials, lightweight security primitives, nanotechnology, and PUFs on the methodological side, as well as the internet of things, automotive security, smart homes, pervasive and wearable computing on the applications side.

Specific topics of interest include, but are not limited to:
• Tamper sensing and tamper protection
• Physical attacks (fault injection, side-channels, etc.), including new attack vectors or attack methods
• Biometrics and hardware security
• Physical unclonable functions (and new/emerging variants thereof)
• Device fingerprinting and hardware forensics
• Item tagging, secure supply chains and product piracy
• Use of emerging computing technologies in security (including quantum techniques)
• New designs and materials for secure hardware
• Nanophysics and nanotechnology in hardware security
• Hardware Trojans and countermeasures
• Lightweight security solutions, primitives and protocols
• Secure and efficient hardware implementation of cryptographic primitives
• Security of reconfigurable and adaptive hardware platforms
• Secure sensors and sensor networks, including physical attacks and countermeasures
• Hardware security in emerging scenarios: Internet of Things, smart home, automotive and autonomous systems, wearable computing, pervasive and ubiquitous computing, etc.
• Scalable hardware solutions that work for particularly large numbers of players/endpoints
• Secure and scalable hardware implementation of machine learning algorithms
• Formal treatments, proofs, standardization, or categorization of the area (incl. surveys and systematization of knowledge papers)

To account for the special nature of hardware security as a rapidly developing discipline, ASHES hosts four different categories of papers: Classical full papers, short papers, wild and crazy (WaC) papers (whose purpose is rapid dissemination of promising, potentially game-changing novel ideas), and systematization of knowledge (SoK) papers (which overview, structure, and categorize a certain subarea). Please visit the workshop’s website for further details:

The workshop will include several technical sessions and invited keynotes, among them Srdjan Capkun (ETH) on general hardware security and Alexander Glaser (Princeton) on security aspects in nuclear weapons inspections.

Workshop Organizers
Chip Hong Chang (NTU Singapore)
Ulrich Rührmair (U Bochum)

Related Resources

FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
IJIS-IoTSec 2018   Springer IJIS Special Issue on IoT Security and Privacy
Cyber Security Attacks and Defenses 2018   Workshop of Cyber Security Attacks and Defenses
JISA-IoT-A&D 2018   Recent Advances in Internet-of-Things Attacks and Defences
CAIJ 2018   Computer Applications: An International Journal
SI-IoT-SECFOR 2018   Special Issue on Security and Forensics of Internet-of-Things: Problems and Solutions
ARIN 2018   4th International Conference on Artificial Intelligence
AsianHOST 2018   Asian Hardware-Oriented Security and Trust Symposium
SPIoT 2018   The 7th International Symposium on Security and Privacy on Internet of Things
IJCSITY 2018   International Journal of Computational Science and Information Technology