Cryptography and Security in Computing Systems [PDF]

The wide diffusion of embedded systems, including multi-core, many-core, and reconfigurable platforms, poses a number of

5 downloads 20 Views 227KB Size

Recommend Stories


PDF Cryptography and Network Security
Just as there is no loss of basic energy in the universe, so no thought or action is without its effects,

[PDF] Cryptography and Network Security
Never let your sense of morals prevent you from doing what is right. Isaac Asimov

[PDF] Cryptography and Network Security
Be grateful for whoever comes, because each has been sent as a guide from beyond. Rumi

Read PdF Cryptography and Network Security
Don't be satisfied with stories, how things have gone with others. Unfold your own myth. Rumi

Read PDF Cryptography and Network Security
Don't count the days, make the days count. Muhammad Ali

Download PDF Cryptography And Network Security
Where there is ruin, there is hope for a treasure. Rumi

Security Issues on Cryptography and Network Security
Those who bring sunshine to the lives of others cannot keep it from themselves. J. M. Barrie

PdF Download Cryptography and Network Security: Principles and Practice
The wound is the place where the Light enters you. Rumi

Review PdF Cryptography and Network Security: Principles and Practice
If you are irritated by every rub, how will your mirror be polished? Rumi

Idea Transcript


2018 CS2 Workshop

Fifth Workshop on

Cryptography and Security in Computing Systems Co-located with HiPEAC 2018 Conference, Manchester, 24 January 2018 HiPEAC Conference Call for Papers Paper Submission CS2 2014 CS2 2015 CS2 2016 CS2 2017

Scope of the Workshop The wide diffusion of embedded systems, including multi-core, many-core, and reconfigurable platforms, poses a number of challenges related to the security of the operation of such systems, as well as of the information stored in them. Malicious adversaries can leverage unprotected communication to hijack cyber-physical systems, resulting in incorrect and potentially highly dangerous behaviours, or can exploit side channel information leakage to recover secret information from a computing system. Untrustworthy third party software and hardware can create openings for such attacks, which must be detected and removed or countered. The prevalence of multi/many core systems opens additional issues such as NoC security. Finally, the complexity on modern and future embedded and mobile systems leads to the need to depart from manual planning and deployment of security features. Thus, design automation tools will be needed to design and verify the security features of new hardware/software systems. The workshop is a venue for security and cryptography experts to interact with the computer architecture and compilers community, aiming at cross-fertilization and multi-disciplinary approaches to security in computing systems. Topics of interest include, but are not limited to: Compiler and Runtime Support for Security Cryptography in Embedded and Reconfigurable Systems Design Automation and Verification of Security Efficient Cryptography through Multi/Many core Systems Engineering and efficient implementation of post-quantum cryptographic primitives Fault Attacks and Countermeasures, including interaction with Fault Tolerance Hardware Architecture and Extensions for Cryptography Hardware/Software Security Techniques Hardware Trojans and Reverse Engineering Physical Unclonable Functions Privacy in Embedded Systems Security of Embedded and Cyberphysical Systems (Medical, Automotive, Smartgrid, Industrial Control) Security of Networks-on-Chips and Multi-core Architectures Side Channel Attacks and Countermeasures Trusted computing The workshop seeks submissions from academia and industry, presenting novel research contributions and industrial case studies.

Important Dates Paper Submission: November 17, 2017 Extended to December 3rd, 2017 Acceptance Notification: December 18, 2017 Extended to December 20th, 2017 Camera Ready Version: December 21, 2017 Extended to January 10th, 2018

Information for authors All submissions must be written in English, and should be anonymized. All papers will be double-blind refereed. Regular submissions should be at most 6 pages in the ACM doublecolumn format including bibliography. Please, use the following template when preparing your manuscript: http://www.acm.org/publications/article-templates/proceedings-template.html Authors must submit their papers (in PDF format) by the deadline indicated above, using the EasyChair web site: https://easychair.org/conferences/?conf=cs220180

Organizing Committee Gerardo Pelosi Politecnico di Milano Giovanni Agosta Politecnico di Milano Alessandro Barenghi Politecnico di Milano Israel Koren UMass Amherst

Program Committee Giovanni Agosta Politecnico di Milano Alessandro Barenghi Politecnico di Milano Dajana Cassioli University of L'Aquila Hervé Chabanne Morpho Fabrizio De Santis Siemens AG Elena Dubrova KTH Jean-Max Dutertre Ecole Nationale Superieure des Mines de Saint Etienne Jacques Fournier CEA-Leti, Grenoble Karine Heydemann Université Pierre et Marie Curie Paris Kitsos Technological Educational Institute of Western Greece Israel Koren UMass Amherst Paolo Maistri, TIMA Stefan Mangard TU Graz Josè A. Onieva University of Malaga Gerardo Pelosi Politecnico di Milano Francesco Regazzoni ALaRI - USI (Switzerland) Joern-Marc Schmidt Institute for Applied Information Processing and Communications, Graz University of Technology Hermann Seuschek Siemens AG Nicolas Sklavos University of Patras Leonel Sousa INESC-ID, IST, Universidade de Lisboa Christos Strydis Erasmus Medical Center, The Netherlands Yannick Teglia Gemalto Davide Zoni Politecnico di Milano Designed by Free CSS Templates, Thanks to Custom Web Design. Modified by G. Agosta.

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.