CS 2019 - Sixth Workshop on Cryptography and Security in Computing Systems
Topics/Call fo Papers
Security features prominently in the HiPEAC Horizon 2020 roadmap, both in Embedded and Mobile Systems strategic areas. Yet the hardware and software security community and the HiPEAC community have few points of contact. The main goal of this workshop is to provide a venue for security and cryptography experts to interact with the computer architecture and compilers community, aiming at cross-fertilization and multi-disciplinary approaches to security in computing systems. The wide diffusion of embedded systems, including multi-core, many-core, and reconfigurable platforms, poses a number of challenges related to the security of the operation of such systems, as well as of the information stored in them. Malicious adversaries can leverage unprotected communication to hijack cyber-physical systems, resulting in incorrect and potentially highly dangerous behaviours, or can exploit implementation specific vulnerabilities arising from the observation of side channel information (e.g., power, timing, electromagnetic emissions) and/or the malicious fault injections to recover secret information from a computing system. Untrustworthy third party software and hardware can create openings for such attacks, which must be detected and removed or countered. The prevalence of multi/many core systems opens additional issues such as NoC security. Finally, the complexity on modern and future embedded and mobile systems leads to the need to depart from manual planning and deployment of security features. Thus, design automation tools will be needed to design and verify the security features of new hardware/software systems. The workshop is a venue for security and cryptography experts to interact with the computer architecture and compilers community, aiming at cross-fertilization and multi-disciplinary approaches to security in computing systems.
Topics of interest include, but are not limited to:
Compiler and Runtime Support for Security
Cryptography in Embedded and Reconfigurable Systems
Design Automation and Verification of Security
Efficient Cryptography through Multi/Many core Systems
Fault Attacks and Countermeasures, including interaction with Fault Tolerance
Hardware Architecture and Extensions for Cryptography
Hardware/Software Security Techniques
Hardware Trojans and Reverse Engineering
Physical Unclonable Functions
Reliability & Privacy in Embedded Systems
Security of Cyberphysical Systems
Security of Networks-on-Chips and Multi-core Architectures
Side Channel Attacks and Countermeasures
Engineering and efficient implementation of post-quantum cryptographic primitives
Topics of interest include, but are not limited to:
Compiler and Runtime Support for Security
Cryptography in Embedded and Reconfigurable Systems
Design Automation and Verification of Security
Efficient Cryptography through Multi/Many core Systems
Fault Attacks and Countermeasures, including interaction with Fault Tolerance
Hardware Architecture and Extensions for Cryptography
Hardware/Software Security Techniques
Hardware Trojans and Reverse Engineering
Physical Unclonable Functions
Reliability & Privacy in Embedded Systems
Security of Cyberphysical Systems
Security of Networks-on-Chips and Multi-core Architectures
Side Channel Attacks and Countermeasures
Engineering and efficient implementation of post-quantum cryptographic primitives
Other CFPs
Last modified: 2018-10-16 20:16:57