| |||||||||||||||
ZTHA 2022 : Zero Trust Hardware Architectures Workshop@ICCAD 2022 | |||||||||||||||
Link: https://zerotrustworkshopiccad.github.io/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Zero Trust Hardware Architectures
Workshop Co-located with 2022 International Conference on Computer-Aided Design (ICCAD) Thursday, November 3, 2022 Virtual Workshop CALL FOR PAPERS https://zerotrustworkshopiccad.github.io In recent times, there has been a major push and urgency to adopt the zero-trust model for cybersecurity. The zero-trust model is based on the principle of “never trust, always verify” and is aimed at eliminating all implicit trust in a system. While adopting a zero-trust model, the underlying hardware needs to be trusted and secured as well. Thus, novel approaches for building zero trust architectures, from systems all the way down to silicon, is one of the big challenges for next generation hardware system design. Traditionally, research on establishing trust and security in hardware has primarily focused on the host and its associated memory subsystems. However, in modern system architectures such as edge/cloud computing, composable systems and chiplet based integrated circuits, the realm of trust needs to be extended beyond the host system and incorporate many hardware devices and IPs. In view of threats such as compromised supply chain integrity, counterfeit chips, hardware trojan implants, malicious firmware, malware, etc., it is important to establish trust in hardware components and to communicate trust between different components of a system. Thus, a new set of protocols that can work to establish trust and security in these new types of system architectures has become necessary. The focus of this workshop will be on all aspects of security and trust required to create zero-trust hardware architectures for heterogeneous computing systems. The areas of interest include but are not limited to: • Roots of Trust and Chain of Trust in hardware • Link encryption and secure communication channels • Extending Trusted execution environments to peripherals • Authentication, Attestation and Encryption in Chiplet based designs • Authentication, Attestation and Encryption in Composable system architectures • Hardware based access control and monitoring • Measuring trust in hardware and systems • Hardware-based security techniques in edge/cloud systems • Supply chain security ________________________________________ Important dates: • Paper Submission Deadline: September 26, 2022 (AOE) • Notification: October 24, 2022 • Camera-Ready: October 31, 2022 • Virtual Workshop: November 3, 2022 ________________________________________ Submission: We welcome four types of submissions: Technical papers with evaluation results, Position papers on directions for research and development, Review papers and Talk abstract (1 page) that describes the content of an oral presentation. Each paper must be 4-6 pages. All accepted papers will be invited to present at the workshop. For more details, please visit the workshop website. EasyChair link: https://easychair.org/my/conference?conf=ztha2022 ________________________________________ Organizers: Sandhya Koteshwara, Mengmei Ye and Hubertus Franke, IBM Research, USA |
|