{"id":246,"date":"2021-11-17T11:57:44","date_gmt":"2021-11-17T10:57:44","guid":{"rendered":"https:\/\/dsd-seaa2022.iuma.ulpgc.es\/?page_id=246"},"modified":"2021-12-04T11:37:22","modified_gmt":"2021-12-04T10:37:22","slug":"dsd-2022-ahsa","status":"publish","type":"page","link":"https:\/\/dsd-seaa2022.iuma.ulpgc.es\/?page_id=246","title":{"rendered":"DSD 2022 &#8211; AHSA"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Architecture and Hardware for Security Applications (AHSA)<\/h1>\n\n\n\n<h2 class=\"wp-block-heading\">Special Session Scope<\/h2>\n\n\n<p>The scope of this special session is on all views of hardware-oriented security. The session provides an excellent opportunity to present new results from both the research and industry communities. Of special interests are contributions that describe new methods for secure-and-efficient hardware implementations for embedded systems, hardware Trojans \u2013 insertion\/detection methodologies, side channel analysis, fault attacks, security of Industrial Internet of Things, security of IoT etc. The topics of this special session include but are not limited to:<\/p>\n<ul>\n<li>Applications of secure hardware<\/li>\n<li>Attacks against hardware implementations and countermeasures<\/li>\n<li>Hardware Trojans and detection techniques<\/li>\n<li>IC Trust and anti-Counterfeiting<\/li>\n<li>Reverse engineering and hardware obfuscation<\/li>\n<li>Hardware security primitives: PUFs and TRNGs<\/li>\n<li>Security architectures in Embedded Systems<\/li>\n<li>Protection of Industrial Internet of Things (IIoT)<\/li>\n<li>Protection of Internet of Things (IoT)<\/li>\n<li>Crypto implementations in area constrained environments<\/li>\n<li>Processors for smart card security<\/li>\n<li>Secure life cycle management<\/li>\n<li>Energy-aware secure architectures<\/li>\n<li>Security architectures for pervasive computing and wireless applications\/protocols<\/li>\n<li>Trusted computing platforms<\/li>\n<li>Secure System-on-Chip (SoC) designs<\/li>\n<li>Lightweight cryptography and implementations<\/li>\n<li>Vehicular security hardware implementations<\/li>\n<li>Hardware architectures for cryptanalysis<\/li>\n<li>Reconfigurable cryptographic primitives<\/li>\n<li>Performance evaluation of secure hardware<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\">Submission Guidelines<\/h2>\n\n\n<p>Authors are encouraged to submit their manuscripts via EasyChair web service at web page <a href=\"https:\/\/easychair.org\/conferences\/?conf=dsd2022\">https:\/\/easychair.org\/conferences\/?conf=dsd2022<\/a>. Each manuscript should include the complete paper text, all illustrations, and references. The manuscript should conform to the IEEE format: single-spaced, double column, US letter page size, 10-point size Times Roman font, up to 8 pages. In order to conduct a blind review, no indication of the authors&#8217; names should appear in the manuscript, references included.<\/p>\n\n\n<h2 class=\"wp-block-heading\">Special Session Chair<\/h2>\n\n\n<p><b>P. Kitsos<\/b>&nbsp;(<em>University of Peloponnese &#8211; GR<\/em>)<\/p>\n<p><b>M. Novotny<\/b>&nbsp;(<em>Czech Technical University in Prague, Czech Republic<\/em>)<\/p>\n\n\n<h2 class=\"wp-block-heading\">Special Session Program Committee<\/h2>\n\n\n<ul>\n<li><strong>Giovanni Agosta<\/strong>, Politecnico di Milano, Italy<\/li>\n<li><strong>Aydin Aysu<\/strong>, North Carolina State University, USA<\/li>\n<li><strong>Luca Cassano<\/strong>, Politecnico di Milano, Italy<\/li>\n<li><strong>Avik Chakraborti<\/strong>, NTT Secure Platform Laboratories, Japan<\/li>\n<li><strong>Rajat Subhra Chakraborty<\/strong>, Indian Inst. of Tech. Kharagpur, India<\/li>\n<li><strong>Ray Cheung<\/strong>, City University of Hong Kong, HK<\/li>\n<li><strong>Jean-Luc Danger<\/strong>, Telecom ParisTech, France<\/li>\n<li><strong>Zoya Dyka,<\/strong> IHP &#8211; Leibniz-Institut f\u00fcr innovative Mikroelektronik, Germany<\/li>\n<li><strong>Jacques Fournier,<\/strong> CEA Leti, France<\/li>\n<li><strong>Apostolos Fournaris<\/strong>, Industrial Systems Institute\/RC Athina, Greece<\/li>\n<li><strong>Kimmo J\u00e4rvinen,<\/strong> University of Helsinki, Finland<\/li>\n<li><strong>Elif Bilge Kavun,<\/strong> The University of Sheffield, UK<\/li>\n<li><strong>Odysseas Koufopavlou,<\/strong> University of Patras, Greece<\/li>\n<li><strong>Francesco Leporati,<\/strong> University of Pavia, Italy<\/li>\n<li><strong>Robert Lorencz,<\/strong> Czech Technical University in Prague, Czech Republic<\/li>\n<li><strong>Martin Novotny,<\/strong> Czech Technical University in Prague, Czech Republic<\/li>\n<li><strong>Gerardo Pelosi,<\/strong> Politecnico di Milano, Italy<\/li>\n<li><strong>Thomas Plos,<\/strong> NXP Semiconductors, Austria<\/li>\n<li><strong>Miguel Morales-Sandoval,<\/strong> CINVESTAV-LTI, Mexico<\/li>\n<li><strong>Fabrizio De Santis,<\/strong> SIEMENS AG, Germany<\/li>\n<li><strong>Georgios Selimis,<\/strong> Intrinsic-ID, The Netherlands<\/li>\n<li><strong>Johanna Sepulveda,<\/strong> Airbus Defence and Space, Germany<\/li>\n<li><strong>Nicolas Sklavos,<\/strong> University of Patras, Greece<\/li>\n<li><strong>Sergei Skorobogatov,<\/strong> University of Cambridge, UK<\/li>\n<li><strong>Takeshi Sugawara,<\/strong> The University of Electro-Communications, Japan<\/li>\n<li><strong>Jo Vliegen,<\/strong> KU Leuven, Belgium<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\">Contact Information<\/h2>\n\n\n<p><strong>Paris Kitsos<\/strong><br><em>Electrical and Computer Engineering Department<\/em><br><em>University of the Peloponnese, Patras, Greece, GR-26334<\/em><br><strong>e-mail<\/strong>: <a href=\"mailto:kitsos@uop.gr\">kitsos@uop.gr<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Architecture and Hardware for Security Applications (AHSA) Special Session Scope The scope of this special session is on all views of hardware-oriented security. The session provides an excellent opportunity to present new results from both the research and industry communities. Of special interests are contributions that describe new methods for secure-and-efficient hardware implementations for embedded [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-246","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/dsd-seaa2022.iuma.ulpgc.es\/index.php?rest_route=\/wp\/v2\/pages\/246","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dsd-seaa2022.iuma.ulpgc.es\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dsd-seaa2022.iuma.ulpgc.es\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dsd-seaa2022.iuma.ulpgc.es\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/dsd-seaa2022.iuma.ulpgc.es\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=246"}],"version-history":[{"count":2,"href":"https:\/\/dsd-seaa2022.iuma.ulpgc.es\/index.php?rest_route=\/wp\/v2\/pages\/246\/revisions"}],"predecessor-version":[{"id":427,"href":"https:\/\/dsd-seaa2022.iuma.ulpgc.es\/index.php?rest_route=\/wp\/v2\/pages\/246\/revisions\/427"}],"wp:attachment":[{"href":"https:\/\/dsd-seaa2022.iuma.ulpgc.es\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}