posted by user: larryshi || 7054 views || tracked by 10 users: [display]

HASP 2013 : The Second Workshop on Hardware and Architectural Support for Security and Privacy

FacebookTwitterLinkedInGoogle

Link: https://sites.google.com/site/haspworkshop2013/
 
When Jun 23, 2013 - Jun 24, 2013
Where Tel-Aviv, Israel
Submission Deadline Apr 17, 2013
Notification Due May 10, 2013
Final Version Due May 20, 2013
Categories    security   privacy   hardware   architecture
 

Call For Papers

===================================================================
The Second Workshop on Hardware and Architectural Support for Security and Privacy

In Conjunction with ISCA 40, June 23 -27, 2013
Tel-Aviv, Israel

Questions: haspworkshop2012@gmail.com
Website: http://sites.google.com/site/haspworkshop2013
Submission: https://www.easychair.org/conferences/?conf=hasp2013
ISCA 40: http://isca2013.eew.technion.ac.il/

CALL FOR PAPERS
===================================================================

Although much attention has been directed to the study of security at the system and the application level, security and privacy research focusing on hardware and architecture aspects remains a new frontier. In the era of cloud computing, pervasive intelligent systems, and nano-scale devices, practitioners and researchers have to address new challenges and requirements in order to meet the ever-changing landscape of security research and new demands from the consumers, enterprises, governments, and defense industry.

HASP is intended to bring together researchers, developers, and practitioners from academia and industry, to share practical implementations/experiences related to all aspects of hardware and architectural support for security and privacy, and to discuss future trends in research and applications. To that end, papers are solicited from the areas, including, but not limited to:

- Architectural and/or system support for security and privacy protection in the context of embedded systems, sensor networks, Internet-of-things, mobile devices, and cloud computing
- Hardware support for trust management
- Hardware and architectural support for digital rights management
- Hardware trojan threat evaluation, detection, and prevention
- Smartcard security
- Architectural and hardware techniques for supporting digital forensics
- Biometric hardware and implementation
- Electronic warfare and countermeasure techniques
- Hardware side-channel exploits and modeling
- Attack resilient hardware and architectural design
- Hardware techniques for homeland security
- Cryptographic hardware design, implementation, and evaluation
- TPM security
- Hardware backdoor and rootkits
- Embedded system security
- FPGA security
- Counterfeit electronics
- Hardware based electronic and digital spoofing attacks
- Interaction between system and micro-architecture
- Simulation, validation, and verification tools
- Analysis of real attacks and threat evaluation

SUBMISSION
===================================================================
Papers reporting original research results pertaining to the above and related topics are solicited. Full paper manuscripts must be in English of up to 8 pages (using the IEEE two-column format). The online submission site is: easy chair. If web submission is not possible, please contact the program co-chairs for alternate arrangements.

To submit regular papers to the conference, please select "HASP 2013" in EasyChair submission site (https://www.easychair.org/conferences/?conf=hasp2013).
If you have questions regarding submission, please contact haspworkshop2012@gmail.com

PUBLICATION
===================================================================

All accepted papers will be published in ACM Digital Library. A copyright form has
to be signed by the authors.

IMPORTANT DATES
===================================================================
Apr. 17, 2013: Submission deadline
May 10, 2013: Notification of acceptance
May 20, 2013: Camera-ready version

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
HASP 2024   Hardware and Architectural Support for Security and Privacy
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
ASPLOS 2025   The ACM International Conference on Architectural Support for Programming Languages and Operating Systems
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
ASPLOS 2025   The ACM International Conference on Architectural Support for Programming Languages and Operating Systems
BDAB 2025   6th International Conference on Big Data and Blockchain
MATHCS 2024   2nd International Conference on Mathematics, Computer Science & Engineering
ICISPP--Ei 2025   2025 6th International Conference on Information Security and Privacy Protection (ICISPP 2025)