When: |
|
19 Jan through 19 Jan 2015 |
CFP Deadline:
|
|
27 Oct 2014
|
Where: |
|
|
Website URL: |
|
|
|
|
-
|
Keywords:
Event description:
***********************************************************************
<br> CS2 2015, CALL FOR CONTRIBUTIONS
<br> Second Workshop on
<br> Cryptography and Security in Computing Systems
<br>
<br> Co-located with HiPEAC 2015 Conference, Amsterdam 19 January 2015
<br> http://www.cs2.deib.polimi.it
<br>***********************************************************************
<br>
<br>Important Dates
<br> October 27, 2014 (11:59 UTC): Paper submission deadline
<br> November 27, 2014: Acceptance notification
<br> December 15, 2014: Final version of accepted papers for workshop
<br> proceedings
<br>
<br>Scope of the Workshop:
<br>The wide diffusion of embedded systems, including multi-core,
<br>many-core, and reconfigurable platforms, poses a number of challenges
<br>related to the security of the operation of such systems, as well as
<br>of the information stored in them.
<br>
<br>Malicious adver...
Read more
***********************************************************************
<br> CS2 2015, CALL FOR CONTRIBUTIONS
<br> Second Workshop on
<br> Cryptography and Security in Computing Systems
<br>
<br> Co-located with HiPEAC 2015 Conference, Amsterdam 19 January 2015
<br> http://www.cs2.deib.polimi.it
<br>***********************************************************************
<br>
<br>Important Dates
<br> October 27, 2014 (11:59 UTC): Paper submission deadline
<br> November 27, 2014: Acceptance notification
<br> December 15, 2014: Final version of accepted papers for workshop
<br> proceedings
<br>
<br>Scope of the Workshop:
<br>The wide diffusion of embedded systems, including multi-core,
<br>many-core, and reconfigurable platforms, poses a number of challenges
<br>related to the security of the operation of such systems, as well as
<br>of the information stored in them.
<br>
<br>Malicious adversaries can leverage unprotected communication to hijack
<br>cyber-physical systems, resulting in incorrect and potentially highly
<br>dangerous behaviours, or can exploit side channel information leakage
<br>to recover secret information from a computing system. Untrustworthy
<br>third party software and hardware can create openings for such
<br>attacks, which must be detected and removed or countered.
<br>The prevalence of multi/many core systems opens additional issues such
<br>as NoC security. Finally, the complexity on modern and future embedded
<br>and mobile systems leads to the need to depart from manual planning
<br>and deployment of security features. Thus, design automation tools
<br>will be needed to design and verify the security features of new
<br>hardware/software systems.
<br>
<br>The CS2 workshop is a venue for security and cryptography experts to
<br>interact with the computer architecture and compilers community,
<br>aiming at cross-fertilization and multi-disciplinary approaches to
<br>security in computing systems.
<br>
<br>Topics of interest include, but are not limited to, the following:
<br> Compiler and Runtime Support for Security
<br> Cryptography in Embedded and Reconfigurable Systems
<br> Design Automation and Verification of Security
<br> Efficient Cryptography through Multi/Many core Systems
<br> Fault Attacks and Countermeasures, including interaction with
<br> Fault Tolerance
<br> Hardware Architecture and Extensions for Cryptography
<br> Hardware/Software Security Techniques
<br> Hardware Trojans and Reverse Engineering
<br> Passive Side Channel Attacks and Countermeasures
<br> Physical Unclonable Functions
<br> Privacy in Embedded Systems
<br> Security of Embedded and Cyber-Physical Systems
<br> Security of Networks-on-Chips and Multi-core Architectures
<br> Trusted computing
<br>
<br>The workshop seeks submissions from academia and industry, presenting
<br>novel research contributions and industrial case studies.
<br>
<br>Submission Guidelines
<br>All submissions must be written in English, and should be anonymized.
<br>All papers will be refereed (double blind).
<br>Regular submissions should be at most 6 pages in the ACM double-column
<br>format including bibliography.
<br>Please, use the ACM template when preparing your manuscript.
<br>Authors must submit their papers (in PDF format) by the deadline
<br>indicated above, using the EasyChair web site.
<br>
<br>Publication
<br>Papers will be included in the ACM Digital Library, with a specific ISBN.
<br>At least one author of each accepted paper must register to the HiPEAC
<br>conference, by the early date indicated by the organizers, and present
<br>the paper.
<br>If you have any question, please contact the program chairs at cs2chair@polimi.it
<br>
<br>
<br>Workshop Organizers:
<br>Gerardo Pelosi, Politecnico di Milano, Italy
<br>Alessandro Barenghi, Politecnico di Milano, Italy
<br>Israel Koren, University of Massachussetts Amherst, USA
<br>Giovanni Agosta, Politecnico di Milano, Italy
<br>
<br>
<br>HiPEAC 2015 home page: http://www.hipeac.net/2015/amsterdam
<br>
Posting date:
23 October 2014 |
196 views
Placement:
Not-featured (How do I make my event featured?)
Flag
(Report this event)