ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

HASP 2013 - The Second Workshop on Hardware and Architectural Support for Security and Privacy

Date2013-06-23 - 2013-06-27

Deadline2013-04-17

VenueTel-Aviv, Israel Israel

Keywords

Websitehttps://sites.google.com/site/haspworksh...

Topics/Call fo Papers

Although much attention has been directed to the study of security at the system
and the application level, security and privacy research focusing on hardware and
architecture aspects remains a new frontier. In the era of cloud computing,
pervasive intelligent systems, and nano-scale devices, practitioners
and researchers have to address new challenges and requirements in order to meet
the ever-changing landscape of security research and new demands from the
consumers, enterprises, governments, and defense industry.
HASP is intended to bring together researchers, developers, and practitioners
from academia and industry, to share practical implementations/experiences
related to all aspects of hardware and architectural support for security and
privacy, and to discuss future trends in research and applications. To that end,
papers are solicited from the areas, including, but not limited to:
- Architectural and/or system support for security and privacy protection in the context
of embedded systems, sensor networks, Internet-of-things, mobile devices,
and cloud computing
- Hardware support for trust management
- Hardware and architectural support for digital rights management
- Hardware trojan threat evaluation, detection, and prevention
- Smartcard security
- Architectural and hardware techniques for supporting digital forensics
- Biometric hardware and implementation
- Electronic warfare and countermeasure techniques
- Hardware side-channel exploits and modeling
- Attack resilient hardware and architectural design
- Hardware techniques for homeland security
- Cryptographic hardware design, implementation, and evaluation
- TPM security
- Hardware backdoor and rootkits
- Embedded system security
- FPGA security
- Counterfeit electronics
- Hardware based electronic and digital spoofing attacks
- Interaction between system and micro-architecture
- Simulation, validation, and verification tools
- Analysis of real attacks and threat evaluation

Last modified: 2013-02-19 15:39:13