Abbrevation
ASHES
City
London
Country
UK
Deadline Paper
Start Date
End Date
Abstract

ASHES deals with any aspects of hardware security, and welcomes any contributions in this area&#046; Among others, it particularly highlights emerging techniques and methods as well as recent application areas within the field&#046; This includes new attack vectors, novel designs and materials, lightweight security primitives, nanotechnology, and PUFs on the methodological side, as well as the internet of things, automotive security, smart homes, pervasive and wearable computing on the applications side&#046; Please see our call for papers for further details&#046;<br>In order to meet the requirements of these rapidly developing subareas, ASHES hosts four categories of papers: Classical full and short papers, as well as systematization of knowledge papers (which overview, structure, and categorize a certain subarea), and wild and crazy papers (whose purpose is rapid dissemination of promising, potentially game&#8211;changing novel ideas)&#046; Our call for papers has all the specifics&#046;<br>The workshop will include several technical sessions and two invited keynotes by Ross Anderson (Cambridge) and Francois&#8211;Xavier Standaert (UC Louvain)&#046;<br>We look forward to seeing you in London!<br>ASHES 2019 welcomes submissions on any aspect of hardware security&#046;<br>This includes, but is not limited to:<br>•Fault injection, side channels, hardware Trojans, and countermeasures<br>•Tamper sensing and tamper protection<br>•New physical attack vectors or methods<br>•Biometrics<br>•Secure sensors<br>•Device fingerprinting and hardware forensics<br>•Lightweight hardware solutions<br>•Secure, efficient, and lightweight hardware implementations<br>•Security of reconfigurable and adaptive hardware<br>•Emerging computing technologies in security<br>•New designs and materials in hardware security<br>•Nanophysics and nanotechnology in hardware security<br>•Physical unclonable functions and new/emerging variants thereof<br>•Item tagging, secure supply chains, and product piracy<br>•Intellectual property protection and content protection<br>•Scalable hardware solutions for large numbers of players/endpoints<br>•Hardware security and machine learning:<br>Secure hardware implementations of machine learning algorithms,<br>machine learning in side channel attacks, etc&#046;<br>•Hardware security in emerging application scenarios:<br>Internet of Things, smart home, automotive and autonomous systems,<br>wearable computing, pervasive and ubiquitous computing, etc&#046;<br>•Architectural factors and hardware security in the cloud<br>•Electronic voting machines<br>•Nuclear weapons inspections and control<br>•Physical layer and wireless network security<br>•Anti&#8211;forensic attacks and protection:<br>Hardware virtualization, anti&#8211;forensic resilient memory acquisition, etc&#046;<br>•Mobile devices, smart cards, and chip cards<br>•Architectural factors in hardware security, isolation versus encryption<br>•Secure hardware for multiparty computation<br>•Integration of hardware root of trust and PUFs<br>•Quality metrics for secure hardware<br>•Conformance and evaluation of secure hardware<br>•Formal treatments, proofs, standardization,<br>or categorization of hardware&#8211;related techniques<br>(incl&#046; surveys and systematization of knowledge papers)<br>