posted by user: djf4te || 5100 views || tracked by 3 users: [display]

ASHES 2019 : Workshop on Attacks and Solutions in Hardware Security

FacebookTwitterLinkedInGoogle

Link: http://ashesworkshop.org/
 
When Nov 15, 2019 - Nov 15, 2019
Where London, UK
Submission Deadline Jul 19, 2019
Notification Due Aug 14, 2019
Final Version Due Aug 30, 2019
Categories    hardware security   physical attacks   biometrics   machine learning
 

Call For Papers

We are happy to announce the Third Workshop on Attacks and Solutions in Hardware Security (ASHES 2019), a post-conference workshop of ACM CCS 2019, one of the premier computer security conferences, in London, UK.

ASHES deals with any aspects of hardware security, and welcomes any contributions in this area. Among others, it particularly highlights emerging techniques and methods as well as recent application areas within the field. This includes new attack vectors, novel designs and materials, lightweight security primitives, nanotechnology, and PUFs on the methodological side, as well as the internet of things, automotive security, smart homes, pervasive and wearable computing on the applications side.

Specific topics of interest include, but are not limited to:
• Fault injection, side channels, hardware Trojans, and countermeasures
• Tamper sensing and tamper protection
• New physical attack vectors or methods
• Biometrics
• Secure sensors
• Device fingerprinting and hardware forensics
• Lightweight hardware solutions
• Secure, efficient, and lightweight hardware implementations
• Security of reconfigurable and adaptive hardware
• Emerging computing technologies in security
• New designs and materials in hardware security
• Nanophysics and nanotechnology in hardware security
• PUFs and new/emerging variants thereof
• Item tagging, secure supply chains, and product piracy
• Intellectual property protection and content protection
• Scalable hardware solutions for many players/endpoints
• Hardware security and machine learning
• Hardware security in emerging application scenarios
• Architectural factors and hardware security in the cloud
• Electronic voting machines
• Nuclear weapons inspections and arms control
• Physical layer and wireless network security
• Anti-forensic attacks and protection
• Mobile devices, smart cards, and chip cards
• Architectural factors in hardware security, isolation versus encryption
• Secure hardware for multiparty computation
• Integration of hardware roots of trust and PUFs
• Quality metrics for secure hardware
• Conformance and evaluation of secure hardware
• Formal treatments, proofs, standardization, or categorization of hardware-related methods

To account for the special nature of hardware security as a rapidly developing discipline, ASHES hosts four different categories of papers: Classical full papers, short papers, wild and crazy (WaC) papers (whose purpose is rapid dissemination of promising, potentially game-changing novel ideas), and systematization of knowledge (SoK) papers (which overview, structure, and categorize a certain subarea). Please visit the workshop’s website for further details: http://ashesworkshop.org/call-for-papers

The workshop will host several technical sessions and two invited keynotes by Ross Anderson (Cambridge) and F.-X. Standaert (UC Louvain).

Related Resources

ExHET 2025   The 4th International Workshop on Extreme Heterogeneity Solutions
Ei/Scopus-ACAI 2024   2024 7th International Conference on Algorithms, Computing and Artificial Intelligence(ACAI 2024)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
AMLDS 2025   IEEE--2025 International Conference on Advanced Machine Learning and Data Science
AsHES 2024   The Fourteenth International Workshop on Accelerators and Hybrid Emerging Systems
IEEE CACML 2025   2025 4th Asia Conference on Algorithms, Computing and Machine Learning (CACML 2025)
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
SECRYPT 2025   22nd International Conference on Security and Cryptography