| |||||||||||||||
HASP 2016 : Hardware and Architectural Support for Security and Privacy | |||||||||||||||
Link: http://caslab.eng.yale.edu/workshops/hasp2016/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
=========================================================================
Hardware and Architectural Support for Security and Privacy (HASP) 2016 In Conjunction with ISCA 43, June 18, 2016 Seoul, Korea Questions: haspworkshop2012@gmail.com Website: http://caslab.eng.yale.edu/workshops/hasp2016/ Submission: https://easychair.org/conferences/?conf=hasp2016 ISCA43: http://isca2016.eecs.umich.edu/ Call for Papers ------------------------------------------------------------------------- Although much attention has been directed to the study of security at the system and application levels, security and privacy research focusing on hardware and architecture aspects is still a new frontier. In the era of cloud computing, smartphones and Internet of Things (IoT), practitioners and researchers have to address new challenges and requirements in order to meet the ever-changing landscape of security research and new demands from consumers, enterprises, governments, defense and other industries. HASP is intended to bring together researchers, developers, and practitioners from academia and industry, to share practical implementations and experiences related to all aspects of hardware and architectural support for security and privacy, and to discuss future trends in research and applications. To that end, papers are solicited from the areas, including, but not limited to: * Secure hardware architectures for smart phones and smart devices * Hardware-enhanced cloud security * Security and privacy aware sensors and sensor networks * Hardware-support for secure Internet-of-things * Hardware and architectural support for trust management * Hardware trojan threat evaluation, detection, and prevention * Hardware backdoors and countermeasures * Security simulation, testing, validation and verification * Architectural and hardware techniques for supporting digital forensics * Biometric hardware and implementation * Cyber war attack and defense techniques * Side-channel exploits, modeling and countermeasures * Attack-resilient hardware and architectural design * Hardware techniques for homeland security * Supply chain security * Cryptographic hardware design, implementation, and evaluation * FPGA security * Hardware based electronic and digital spoofing attacks * Analysis of real attacks and threat evaluation In addition to regular research papers, authors are also invited to submit position papers or systemization-of-knowledge papers. Position papers should define new problems in hardware or architecture security and privacy topics. Titles of position papers should be prefixed with "Position Paper:". Systemization-of-knowledge papers should concisely, but exhaustively, systematize and conceptualize existing knowledge (similar to SoK papers in S&P conferences, but focusing on hardware and architecture). Titles of Systemization-of-knowledge papers should be prefixed with "SoK:”. Important Dates Submission Deadline: March 18, 2016, 5pm EST Notification of Acceptance: April 15, 2016 Camera-Ready Version: April 29, 2016 Workshop: June 18, 2016 Submission Information Submissions must be written in English with at most 8 pages including the bibliography and appendices. Submissions must be in double-column ISCA 2016 format. All papers need to be anonymized. Submissions must be in PDF format. All accepted and presented papers will be included in the ACM Digital Library. Papers can be submitted on the EasyChair web page: https://easychair.org/conferences/?conf=hasp2016. |
|