The Second Workshop on Hardware and Architectural Support for Security and Privacy

                In Conjunction with ISCA 40, June 24, 2013
                                    Tel-Aviv, Israel

                Questions:  haspworkshop2012@gmail.com
                Website: http://sites.google.com/site/haspworkshop2013/
                Submission: https://www.easychair.org/conferences/?conf=hasp2013
                ISCA40: http://isca2013.eew.technion.ac.il/


Although much attention has been directed to the study of security at the system
and the application level, security and privacy research focusing on hardware and
architecture aspects remains a new frontier. In the era of cloud computing,
pervasive intelligent systems, and nano-scale devices, practitioners
and researchers have to address new challenges and requirements in order to meet
the ever-changing landscape of security research and new demands from the
consumers, enterprises, governments, and defense industry.

HASP is intended to bring together researchers, developers, and practitioners
from academia and industry, to share practical implementations/experiences
related to all aspects of hardware and architectural support for security and
privacy, and to discuss future trends in research and applications. To that end,
papers are solicited from the areas, including, but not limited to:

 - Architectural and/or system support for security and privacy protection in the context
   of embedded systems, sensor networks, Internet-of-things, mobile devices,
   and cloud computing
 - Hardware support for trust management
 - Hardware and architectural support for digital rights management
 - Hardware trojan threat evaluation, detection, and prevention
 - Smartcard security
 - Architectural and hardware techniques for supporting digital forensics
 - Biometric hardware and implementation
 - Electronic warfare and countermeasure techniques
 - Hardware side-channel exploits and modeling
 - Attack resilient hardware and architectural design
 - Hardware techniques for homeland security
 - Cryptographic hardware design, implementation, and evaluation
 - TPM security
 - Hardware backdoor and rootkits
 - Embedded system security
 - FPGA security
 - Counterfeit electronics
 - Hardware based electronic and digital spoofing attacks
 - Interaction between system and micro-architecture
 - Simulation, validation, and verification tools
 - Analysis of real attacks and threat evaluation

All accepted and presented papers will be included in the ACM DL.
Please follow the instruction of the link:

HASP'13 is now in ACM DL. Please follow the URL: http://dl.acm.org/citation.cfm?id=2487726

Apr. 22, 2013 Apr. 29, 2013: Submission deadline
May 10, 2013: Notification of acceptance
May 20, 2013: Camera-ready version

Papers reporting original research results pertaining to the above and related topics
are solicited. Full paper manuscripts must be in English of up to 8 pages.
Submission is anonymous.

Ruby Lee           Princeton University
Weidong Shi
University of Houston

Wayne Burleson        University of Massachusetts
Siddhartha Chhabra        Intel
Sylvain Guilley
Institut TELECOM, TELECOM ParisTech
Ted Huffmire
Naval Postgraduate School
Zhiqiang Lin
UT Dallas
Filippo Melzani
Patrick Schaumont
Virginia Tech
Simha Sethumadhavan
Columbia University
Weidong Shi
University of Houston
Nicolas Sklavos
Technological Educational Institute of Patras
Taeweon Suh
Korea University
Jakub Szefer
Princeton University
Zhen Wang
Zhi Wang
North Carolina State University