posted by organizer: djf4te || 353 views || tracked by 2 users: [display]

ASHES 2018 : Second Workshop on Attacks and Solutions in Hardware Security

FacebookTwitterLinkedInGoogle

Link: http://ashesworkshop.org
 
When Oct 19, 2018 - Oct 19, 2018
Where Toronto, CA
Submission Deadline Jul 8, 2018
Notification Due Sep 5, 2018
Final Version Due Sep 19, 2018
Categories    hardware security   cryptography   IOT   nanotechnology
 

Call For Papers

ASHES 2018 – CALL FOR PAPERS & PARTICIPATION

We are happy to announce the Second Workshop on Attacks and Solutions in Hardware Security (ASHES 2018), a post-conference workshop of ACM CCS 2018, one of the premier computer security conferences, in Toronto, Canada.

ASHES deals with any aspects of hardware security, and welcomes any contributions in this area. Among others, it particularly highlights emerging techniques and methods as well as recent application areas within the field. This includes new attack vectors, novel designs and materials, lightweight security primitives, nanotechnology, and PUFs on the methodological side, as well as the internet of things, automotive security, smart homes, pervasive and wearable computing on the applications side.

Specific topics of interest include, but are not limited to:
• Tamper sensing and tamper protection
• Physical attacks (fault injection, side-channels, etc.), including new attack vectors or attack methods
• Biometrics and hardware security
• Physical unclonable functions (and new/emerging variants thereof)
• Device fingerprinting and hardware forensics
• Item tagging, secure supply chains and product piracy
• Use of emerging computing technologies in security (including quantum techniques)
• New designs and materials for secure hardware
• Nanophysics and nanotechnology in hardware security
• Hardware Trojans and countermeasures
• Lightweight security solutions, primitives and protocols
• Secure and efficient hardware implementation of cryptographic primitives
• Security of reconfigurable and adaptive hardware platforms
• Secure sensors and sensor networks, including physical attacks and countermeasures
• Hardware security in emerging scenarios: Internet of Things, smart home, automotive and autonomous systems, wearable computing, pervasive and ubiquitous computing, etc.
• Scalable hardware solutions that work for particularly large numbers of players/endpoints
• Secure and scalable hardware implementation of machine learning algorithms
• Formal treatments, proofs, standardization, or categorization of the area (incl. surveys and systematization of knowledge papers)

To account for the special nature of hardware security as a rapidly developing discipline, ASHES hosts four different categories of papers: Classical full papers, short papers, wild and crazy (WaC) papers (whose purpose is rapid dissemination of promising, potentially game-changing novel ideas), and systematization of knowledge (SoK) papers (which overview, structure, and categorize a certain subarea). Please visit the workshop’s website for further details: http://ashesworkshop.org/call-for-papers

The workshop will include several technical sessions and invited keynotes, among them Srdjan Capkun (ETH) on general hardware security and Alexander Glaser (Princeton) on security aspects in nuclear weapons inspections.

Workshop Organizers
Chip Hong Chang (NTU Singapore)
Ulrich Rührmair (U Bochum)

Related Resources

FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
IJIS-IoTSec 2018   Springer IJIS Special Issue on IoT Security and Privacy
JISA-IoT-A&D 2018   Recent Advances in Internet-of-Things Attacks and Defences
NMOCT 2018   4th International Conference On Networks, Mobile Communications And Telematics
Cyber Security Attacks and Defenses 2018   Workshop of Cyber Security Attacks and Defenses
MSEJ 2018   Advances in Materials Science and Engineering: An International Journal
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
CAIJ 2018   Computer Applications: An International Journal
Symmetry-SI 2018   Symmetry and Asymmetry Applications for Internet of Things Security and Privacy
SECITC 2018   11th International Conference on Security for Information Technology and Communications