posted by user: djf4te || 4747 views || tracked by 3 users: [display]

ASHES 2019 : Workshop on Attacks and Solutions in Hardware Security

FacebookTwitterLinkedInGoogle

Link: http://ashesworkshop.org/
 
When Nov 15, 2019 - Nov 15, 2019
Where London, UK
Submission Deadline Jul 19, 2019
Notification Due Aug 14, 2019
Final Version Due Aug 30, 2019
Categories    hardware security   physical attacks   biometrics   machine learning
 

Call For Papers

We are happy to announce the Third Workshop on Attacks and Solutions in Hardware Security (ASHES 2019), a post-conference workshop of ACM CCS 2019, one of the premier computer security conferences, in London, UK.

ASHES deals with any aspects of hardware security, and welcomes any contributions in this area. Among others, it particularly highlights emerging techniques and methods as well as recent application areas within the field. This includes new attack vectors, novel designs and materials, lightweight security primitives, nanotechnology, and PUFs on the methodological side, as well as the internet of things, automotive security, smart homes, pervasive and wearable computing on the applications side.

Specific topics of interest include, but are not limited to:
• Fault injection, side channels, hardware Trojans, and countermeasures
• Tamper sensing and tamper protection
• New physical attack vectors or methods
• Biometrics
• Secure sensors
• Device fingerprinting and hardware forensics
• Lightweight hardware solutions
• Secure, efficient, and lightweight hardware implementations
• Security of reconfigurable and adaptive hardware
• Emerging computing technologies in security
• New designs and materials in hardware security
• Nanophysics and nanotechnology in hardware security
• PUFs and new/emerging variants thereof
• Item tagging, secure supply chains, and product piracy
• Intellectual property protection and content protection
• Scalable hardware solutions for many players/endpoints
• Hardware security and machine learning
• Hardware security in emerging application scenarios
• Architectural factors and hardware security in the cloud
• Electronic voting machines
• Nuclear weapons inspections and arms control
• Physical layer and wireless network security
• Anti-forensic attacks and protection
• Mobile devices, smart cards, and chip cards
• Architectural factors in hardware security, isolation versus encryption
• Secure hardware for multiparty computation
• Integration of hardware roots of trust and PUFs
• Quality metrics for secure hardware
• Conformance and evaluation of secure hardware
• Formal treatments, proofs, standardization, or categorization of hardware-related methods

To account for the special nature of hardware security as a rapidly developing discipline, ASHES hosts four different categories of papers: Classical full papers, short papers, wild and crazy (WaC) papers (whose purpose is rapid dissemination of promising, potentially game-changing novel ideas), and systematization of knowledge (SoK) papers (which overview, structure, and categorize a certain subarea). Please visit the workshop’s website for further details: http://ashesworkshop.org/call-for-papers

The workshop will host several technical sessions and two invited keynotes by Ross Anderson (Cambridge) and F.-X. Standaert (UC Louvain).

Related Resources

IJIS Special Issue 2024   Reinforcing Cyber Security of Critical Infrastructures through Digital Twins
ECAI 2024   27th European Conference on Artificial Intelligence
AsHES 2024   The Fourteenth International Workshop on Accelerators and Hybrid Emerging Systems
AIM@EPIA 2024   Artificial Intelligence in Medicine
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ICMLA 2024   23rd International Conference on Machine Learning and Applications
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
ICDM 2024   IEEE International Conference on Data Mining
RAID 2024   The 27th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2024)
IEEE ICA 2022   The 6th IEEE International Conference on Agents