posted by organizer: skoteshwara || 788 views || tracked by 3 users: [display]

ZTHA 2022 : Zero Trust Hardware Architectures Workshop@ICCAD 2022


When Nov 3, 2022 - Nov 3, 2022
Where Virtual Workshop
Submission Deadline Sep 26, 2022
Notification Due Oct 24, 2022
Final Version Due Oct 31, 2022
Categories    hardware security   cloud computing   edge computing   computer architecture

Call For Papers

Zero Trust Hardware Architectures
Co-located with 2022 International Conference on Computer-Aided Design (ICCAD)
Thursday, November 3, 2022
Virtual Workshop


In recent times, there has been a major push and urgency to adopt the zero-trust model for cybersecurity. The zero-trust model is based on the principle of “never trust, always verify” and is aimed at eliminating all implicit trust in a system. While adopting a zero-trust model, the underlying hardware needs to be trusted and secured as well. Thus, novel approaches for building zero trust architectures, from systems all the way down to silicon, is one of the big challenges for next generation hardware system design.
Traditionally, research on establishing trust and security in hardware has primarily focused on the host and its associated memory subsystems. However, in modern system architectures such as edge/cloud computing, composable systems and chiplet based integrated circuits, the realm of trust needs to be extended beyond the host system and incorporate many hardware devices and IPs. In view of threats such as compromised supply chain integrity, counterfeit chips, hardware trojan implants, malicious firmware, malware, etc., it is important to establish trust in hardware components and to communicate trust between different components of a system. Thus, a new set of protocols that can work to establish trust and security in these new types of system architectures has become necessary. The focus of this workshop will be on all aspects of security and trust required to create zero-trust hardware architectures for heterogeneous computing systems.

The areas of interest include but are not limited to:
• Roots of Trust and Chain of Trust in hardware
• Link encryption and secure communication channels
• Extending Trusted execution environments to peripherals
• Authentication, Attestation and Encryption in Chiplet based designs
• Authentication, Attestation and Encryption in Composable system architectures
• Hardware based access control and monitoring
• Measuring trust in hardware and systems
• Hardware-based security techniques in edge/cloud systems
• Supply chain security
Important dates:
• Paper Submission Deadline: September 26, 2022 (AOE)
• Notification: October 24, 2022
• Camera-Ready: October 31, 2022
• Virtual Workshop: November 3, 2022
We welcome four types of submissions: Technical papers with evaluation results, Position papers on directions for research and development, Review papers and Talk abstract (1 page) that describes the content of an oral presentation. Each paper must be 4-6 pages. All accepted papers will be invited to present at the workshop. For more details, please visit the workshop website.

EasyChair link:
Sandhya Koteshwara, Mengmei Ye and Hubertus Franke, IBM Research, USA

Related Resources

ACM-EI/Scopus-ACAI 2022   2022 5th International Conference on Algorithms, Computing and Artificial Intelligence (ACAI 2022)-EI Compendex
ICHST 2023   2023 5th International Conference on Hardware Security and Trust (ICHST 2023)
CBW 2023   4th International Conference on Cloud, Big Data and Web Services
ICHST--Ei, Scopus 2022   2022 4th International Conference on Hardware Security and Trust (ICHST 2022)--Ei Compendex, Scopus
OpenSuCo @ ISC HPC 2017   2017 International Workshop on Open Source Supercomputing
EUC 2022   EUC 2022: The 20th IEEE International Conference on Embedded and Ubiquitous Computing
ICISE--EI 2022   2022 the 7th International Conference on Information Systems Engineering (ICISE 2022)
ICHST--Ei Compendex, Scopus 2022   2022 4th International Conference on Hardware Security and Trust (ICHST 2022)--Ei Compendex, Scopus
IOTBC 2023   International Conference IOT, Blockchain and Cryptography
IEEE DApps - ZKP 2022   IEEE DApps - Special Session “Verifiable Off-Chain Computations using Zero-Knowledge Proofs – A DApp Perspective”