Scope of ASHES
ASHES 2017 welcomes submissions on any aspect of hardware security.
This includes, but is not limited to:
- Tamper sensing and tamper protection
- Physical attacks (fault injection, side-channels, etc.),
including new attack vectors or attack methods
- Biometrics and hardware security
- Physical unclonable functions (and new/emerging variants thereof)
- Device fingerprinting and hardware forensics
- Item tagging, secure supply chains and product piracy
- Use of emerging computing technologies in security (including quantum techniques)
- New designs and materials for secure hardware
- Nanophysics and nanotechnology in hardware security
- Hardware Trojans and countermeasures
- Lightweight security solutions, primitives and protocols
- Secure and efficient hardware implementation of cryptographic primitives
- Security of reconfigurable and adaptive hardware platforms
- Sensors and sensor networks
- Hardware security in emerging application scenarios: Internet of Things, smart home, automotive, wearable computing, pervasive and ubiquitous computing, etc.
- Scalable hardware solutions that work for particularly large numbers of players/endpoints
- Formal treatments, proofs, standardization, or categorization of the area
(incl. surveys and systematization of knowledge papers)
To account for the special nature of hardware security as a novel and rapidly developing discipline, the workshop offers four different categories of papers:
- Full papers, with up to 10 pages in ACM double column format (including references and appendices), and a 25 min presentation timeslot at the workshop (including questions).
- Short papers, with up to 6 pages in ACM double column format (including references and appendices), and a 15 min presentation timeslot at the workshop (including questions).
- Wild and crazy (WaC) papers, with 3 to 6 pages in ACM double column format, with additional appendices and references of up to 6 pages, and 15 min presentation timeslot at the workshop (including questions). WaC papers are meant to target groundbreaking new methods and paradigms for hardware security. Their focus lies on novelty and potential impact, and on the plausibility of their argumentation, but not on a full demonstration or complete implementation of their ideas. They are reviewed and assessed as such. Wild and crazy papers must bear the prefix “WaC:” in their title from the submission onwards.
- Systematization of knowledge (SoK) papers, with up to 12 pages in ACM double column format (including appendices and references), and a 25 min presentation timeslot at the workshop (including questions). SoK papers shall evaluate, systematize, and contextualize existing knowledge. They should serve the community by fostering and structuring the development of a particular subarea within hardware security. Ideally, but not necessarily, they might provide a new viewpoint on an established, important subarea, support or challenge long-standing beliefs with compelling evidence, or present a convincing new taxonomy. They will be reviewed and assessed as such. Systematization of knowledge papers must bear the prefix “SoK:” in the title from the submission onwards.
Papers are to be submitted via the menu paper submission.
- Paper submission deadline:
August 4, 2017 23:59:59 EDT,August 18, 2017 23:59:59 EDT
- Acceptance notification: September 4, 2017
- Camera-ready deadline: September 17, 2017
- Workshop date: November 3, 2017
Call for Papers in PDF Format
The call for papers can be downloaded as a flyer in PDF format here.