Hardware and Architectural Support for Security and Privacy

                  Workshop In Conjunction with ISCA 2014, Jun 15, 2014
                      Minneapolis, MN, USA

                  Questions:  haspworkshop2012@gmail.com
                  Website: http://sites.google.com/site/haspworkshop2014/
                  Submission: https://www.easychair.org/conferences/?conf=hasp2014
                  ISCA 2014: http://cag.engr.uconn.edu/isca2014/


Although much attention has been directed to the study of security at the system and application levels, security and privacy research focusing on hardware and architecture aspects is at a new frontier. In the era of cloud computing, pervasive intelligent systems, and nano-scale devices, practitioners and researchers have to address new challenges and requirements in order to meet the ever-changing landscape of security research and new demands from consumers, enterprises, governments, defense and other industries.

HASP is intended to bring together researchers, developers, and practitioners from academia and industry, to share practical implementations/experiences related to all aspects of hardware and architectural support for security and privacy, and to discuss future trends in research and applications. To that end, papers are solicited from the areas, including, but not limited to:

 - Architectural and/or system support for security and privacy protection in the context of embedded systems, sensor networks, Internet-of-things, mobile devices, and cloud computing

 - Hardware and architectural support for trust management

 - Hardware and architectural support for digital rights management

 - Hardware trojan threat evaluation, detection, and prevention

 - Architectural and hardware techniques for supporting digital forensics

 - Biometric hardware and implementation

 - Electronic warfare and countermeasure techniques

 - Side-channel exploits and modeling

 - Attack resilient hardware and architectural design

 - Hardware techniques for homeland security

 - Cryptographic hardware design, implementation, and evaluation

 - FPGA security

 - Hardware backdoor

 - Embedded system security

 - Hardware based electronic and digital spoofing attacks

 - Interaction between system and micro-architecture

 - Security simulation, testing, validation and verification

 - Analysis of real attacks and threat evaluation



Papers reporting original research results pertaining to the above and related topics are solicited. Full paper manuscripts must be in English of up to 8 pages double-column. Submission is anonymous.

All accepted and presented papers will be included in the ACM DL.
Please follow the instruction of the link:
ACM SIG Proceedings Templates



March 17, 2014 March 24, 2014: Submission deadline

April 6, 2014: Notification of acceptance

April 30, 2014: Camera-ready version

June 15, 2014: Workshop