Co-located with HiPEAC 2015 Conference, Amsterdam 19 January 2015

Scope of the Workshop

The wide diffusion of embedded systems, including multi-core, many-core, and reconfigurable platforms, poses a number of challenges related to the security of the operation of such systems, as well as of the information stored in them. Malicious adversaries can leverage unprotected communication to hijack cyber-physical systems, resulting in incorrect and potentially highly dangerous behaviours, or can exploit side channel information leakage to recover secret information from a computing system. Untrustworthy third party software and hardware can create openings for such attacks, which must be detected and removed or countered. The prevalence of multi/many core systems opens additional issues such as NoC security. Finally, the complexity on modern and future embedded and mobile systems leads to the need to depart from manual planning and deployment of security features. Thus, design automation tools will be needed to design and verify the security features of new hardware/software systems. The workshop is a venue for security and cryptography experts to interact with the computer architecture and compilers community, aiming at cross-fertilization and multi-disciplinary approaches to security in computing systems.

Topics of interest include, but are not limited to:
  • Compiler and Runtime Support for Security
  • Cryptography in Embedded and Reconfigurable Systems
  • Design Automation and Verification of Security
  • Efficient Cryptography through Multi/Many core Systems
  • Fault Attacks and Countermeasures, including interaction with Fault Tolerance
  • Passive Side Channel Attacks and Countermeasures
  • Hardware Architecture and Extensions for Cryptography
  • Hardware/Software Security Techniques
  • Hardware Trojans and Reverse Engineering
  • Physical Unclonable Functions
  • Privacy in Embedded Systems
  • Security of Embedded and Cyber-Physical Systems
  • Security of Networks-on-Chips and Multi-core Architectures
  • Trusted computing
The workshop seeks submissions from academia and industry, presenting novel research contributions and industrial case studies.

Important Dates

  • Paper Submission: October 27, 2014November 3, 2014 (Extended deadline)
  • Acceptance Notification: December 3, 2014
  • Camera Ready Version: December 15, 2014

Information for authors

All submissions must be written in English, and should be anonymized. All papers will be double-blind refereed. Regular submissions should be at most 6 pages in the ACM double-column format including bibliography. Please, use the following template when preparing your manuscript: http://www.acm.org/sigs/publications/proceedings-templates
Authors must submit their papers (in PDF format) by the deadline indicated above, using the EasyChair web site:
https://www.easychair.org/conferences/?conf=cs22015

Publication

ACM ICPS Papers will be included in the ACM Digital Library as part of the International Conference Proceedings Series, with a specific ISBN. At least one author of each accepted paper must register to the HiPEAC conference, by the early date indicated by the organizers, and present the paper.
CS2

Organizing Committee

  • Gerardo Pelosi
    Politecnico di Milano
  • Alessandro Barenghi
    Politecnico di Milano
  • Israel Koren
    UMass Amherst
  • Giovanni Agosta
    Politecnico di Milano

Program Committee (to be completed)


  • Giovanni Agosta, POLIMI
  • Alessandro Barenghi, POLIMI
  • Luca Breveglieri, POLIMI
  • Rainer Buchty, TU Braunschweig
  • Hervé Chabanne, Morpho
  • Fabrizio De Santis, TU Munich
  • Giorgio Di Natale, LIRMM
  • Alberto Ferrante, ALaRI, USI
  • Leandro Fiorin, IBM Research
  • Jacques Fournier, CEA Tech DPACA
  • Sylvain Guilley, GET/ENST, CNRS/LTCI
  • Paris Kitsos, TEI Western Greece
  • Israel Koren, UMass Amherst
  • Vianney Lapotre, U. Bretagne Sud
  • Paolo Maistri, TIMA
  • Philippe Maurine, LIRMM/CEA
  • Jose A. Onieva, U. Malaga
  • Gianluca Palermo, POLIMI
  • Gerardo Pelosi, POLIMI
  • Francesco Regazzoni, ALaRI
  • Bruno Robisson, CEA
  • Mariagiovanna Sami, POLIMI/ALaRI
  • Erkay Savas, Sabanci U.
  • Joern-Marc Schmidt, TU Graz
  • Cristina Silvano, POLIMI
  • Leonel Sousa, IST/INESC-ID
  • Ingo Stengel, Plymouth U.
  • Christos Strydis, Erasmus MC
  • Yannick Teglia, STMicroelectronics
  • Vincent Van Der Leest, Intrinsic-ID