posted by organizer: gagosta || 7148 views || tracked by 21 users: [display]

CS2 2015 : Second Workshop on Cryptography and Security in Computing Systems

FacebookTwitterLinkedInGoogle

Link: http://www.cs2.deib.polimi.it/
 
When Jan 19, 2015 - Jan 21, 2015
Where Amsterdam
Submission Deadline Oct 27, 2014
Notification Due Nov 27, 2014
Final Version Due Dec 15, 2014
Categories    computer security   cryptography   embedded systems
 

Call For Papers

***********************************************************************
CS2 2015, CALL FOR CONTRIBUTIONS
Second Workshop on
Cryptography and Security in Computing Systems

Co-located with HiPEAC 2015 Conference, Amsterdam 19 January 2015
http://www.cs2.deib.polimi.it
***********************************************************************

Important Dates
October 27, 2014 (11:59 UTC): Paper submission deadline
November 27, 2014: Acceptance notification
December 15, 2014: Final version of accepted papers for workshop
proceedings

Scope of the Workshop:
The wide diffusion of embedded systems, including multi-core,
many-core, and reconfigurable platforms, poses a number of challenges
related to the security of the operation of such systems, as well as
of the information stored in them.

Malicious adversaries can leverage unprotected communication to hijack
cyber-physical systems, resulting in incorrect and potentially highly
dangerous behaviours, or can exploit side channel information leakage
to recover secret information from a computing system. Untrustworthy
third party software and hardware can create openings for such
attacks, which must be detected and removed or countered.
The prevalence of multi/many core systems opens additional issues such
as NoC security. Finally, the complexity on modern and future embedded
and mobile systems leads to the need to depart from manual planning
and deployment of security features. Thus, design automation tools
will be needed to design and verify the security features of new
hardware/software systems.

The CS2 workshop is a venue for security and cryptography experts to
interact with the computer architecture and compilers community,
aiming at cross-fertilization and multi-disciplinary approaches to
security in computing systems.

Topics of interest include, but are not limited to, the following:
Compiler and Runtime Support for Security
Cryptography in Embedded and Reconfigurable Systems
Design Automation and Verification of Security
Efficient Cryptography through Multi/Many core Systems
Fault Attacks and Countermeasures, including interaction with
Fault Tolerance
Hardware Architecture and Extensions for Cryptography
Hardware/Software Security Techniques
Hardware Trojans and Reverse Engineering
Passive Side Channel Attacks and Countermeasures
Physical Unclonable Functions
Privacy in Embedded Systems
Security of Embedded and Cyber-Physical Systems
Security of Networks-on-Chips and Multi-core Architectures
Trusted computing

The workshop seeks submissions from academia and industry, presenting
novel research contributions and industrial case studies.

Submission Guidelines
All submissions must be written in English, and should be anonymized.
All papers will be refereed (double blind).
Regular submissions should be at most 6 pages in the ACM double-column
format including bibliography.
Please, use the ACM template when preparing your manuscript.
Authors must submit their papers (in PDF format) by the deadline
indicated above, using the EasyChair web site.

Publication
Papers will be included in the ACM Digital Library, with a specific ISBN.
At least one author of each accepted paper must register to the HiPEAC
conference, by the early date indicated by the organizers, and present
the paper.
If you have any question, please contact the program chairs at cs2chair@polimi.it


Workshop Organizers:
Gerardo Pelosi, Politecnico di Milano, Italy
Alessandro Barenghi, Politecnico di Milano, Italy
Israel Koren, University of Massachussetts Amherst, USA
Giovanni Agosta, Politecnico di Milano, Italy


HiPEAC 2015 home page: http://www.hipeac.net/2015/amsterdam

Related Resources

ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
AGRIJ 2024   Agricultural Science: An International journal
SECRYPT 2025   22nd International Conference on Security and Cryptography
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
ICISSP 2025   11th International Conference on Information Systems Security and Privacy
BDE 2025   2025 7th International Conference on Big Data Engineering (BDE 2025)
HPCCT--ESCI 2025   2025 the 9th High Performance Computing and Cluster Technologies Conference (HPCCT 2025)--ESCI
CSP 2025   2025 9th International Conference on Cryptography, Security and Privacy (CSP 2025)
ICCIA--EI 2025   2025 10th International Conference on Computational Intelligence and Applications (ICCIA 2025)