posted by user: gagosta || 4365 views || tracked by 5 users: [display]

CS 2019 : Sixth Workshop on Cryptography and Security in Computing Systems


When Jan 21, 2019 - Jan 21, 2019
Where Valencia
Submission Deadline Nov 15, 2018
Notification Due Dec 15, 2018
Final Version Due Dec 21, 2018
Categories    applied cryptography   security   computer architectures   embedded systems

Call For Papers

Sixth Workshop on
Cryptography and Security in Computing Systems

Co-located with HiPEAC 2019 Conference, Valencia 21 January 2019

The wide diffusion of embedded systems, including multi-core, many-core, and
reconfigurable platforms, poses a number of challenges related to the security
of the operation of such systems, as well as of the information stored in them.
Malicious adversaries can leverage unprotected communication to hijack
cyber-physical systems, resulting in incorrect and potentially highly dangerous
behaviours, or can exploit side channel information leakage to recover secret
information from a computing system. Untrustworthy third party software and
hardware can create openings for such attacks, which must be detected and
removed or countered. The prevalence of multi/many core systems opens additional
issues such as NoC security. Finally, the complexity on modern and future
embedded and mobile systems leads to the need to depart from manual planning and
deployment of security features. Thus, design automation tools will be needed to
design and verify the security features of new hardware/software systems.

The workshop is a venue for security and cryptography experts to interact with
the computer architecture and compilers community, aiming at cross-fertilization
and multi-disciplinary approaches to security in computing systems.

Topics of interest include, but are not limited to:

* Compiler and Runtime Support for Security
* Cryptography in Embedded and Reconfigurable Systems
* Design Automation and Verification of Security
* Efficient Cryptography through Multi/Many core Systems
* Fault Attacks and Countermeasures, including interaction with Fault Tolerance
* Hardware Architecture and Extensions for Cryptography
* Hardware/Software Security Techniques
* Hardware Trojans and Reverse Engineering
* Physical Unclonable Functions
* Reliability & Privacy in Embedded Systems
* Security of Cyberphysical Systems
* Security of Networks-on-Chips and Multi-core Architectures
* Side Channel Attacks and Countermeasures
* Engineering and efficient implementation of post-quantum cryptographic primitives

The workshop seeks submissions from academia and industry, presenting novel
research contributions and industrial case studies.

Important Dates
Paper Submission: November 15, 2018
Acceptance Notification: December 15, 2018
Camera Ready Version: December 21, 2018

Information for authors
All submissions must be written in English, and should be anonymized. All papers
will be double-blind refereed. Regular submissions should be at most 6 pages in
the ACM double-column format including bibliography. Please, use the following
template when preparing your manuscript:

Authors must submit their papers (in PDF format) by the deadline indicated
above, using the EasyChair web site:

Workshop Organizers:
Giovanni Agosta, Politecnico di Milano, Italy
Karine Heydemann, Sorbonne Universite', France
Alessandro Barenghi, Politecnico di Milano, Italy
Gerardo Pelosi, Politecnico di Milano, Italy

If you have any question,
please contact the program chairs at

HiPEAC 2019 home page:

Related Resources

IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)
IEEE COINS 2022   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems |
S&P 2022   IEEE Symposium on Security and Privacy (Third deadline)
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
IEEE COINS 2022   International Conference on Omni-Layer Intelligent Systems Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Se
EMSA 2022   11th International Conference on Embedded Systems and Applications
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
CMCA 2022   11th International Conference on Control, Modelling, Computing and Applications
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)