August 12, 2022
August 12, 2022
Zero Trust Hardware Architectures Workshop
Co-located with 2022 International Conference on Computer-Aided Design (ICCAD)
Thursday, November 3, 2022
San Diego, California, USA
Hybrid: In-Person and Virtual Workshop
Call for Papers
In recent times, there has been a major push and urgency to adopt the zero-trust model for cybersecurity. The zero-trust model is based on the principle of “never trust, always verify” and is aimed at eliminating all implicit trust in a system. While adopting a zero-trust model, the underlying hardware needs to be trusted and secured as well. Thus, novel approaches for building zero trust architectures, from systems all the way down to silicon, is one of the big challenges for next generation hardware system design.
Traditionally, research on establishing trust and security in hardware has primarily focused on the host and its associated memory subsystems. However, in modern system architectures such as edge/cloud computing, composable systems and chiplet based integrated circuits, the realm of trust needs to be extended beyond the host system and incorporate many hardware devices and IPs. In view of threats such as compromised supply chain integrity, counterfeit chips, hardware trojan implants, malicious firmware, malware, etc., it is important to establish trust in hardware components and to communicate trust between different components of a system. Thus, a new set of protocols that can work to establish trust and security in these new types of system architectures has become necessary. The focus of this workshop will be on all aspects of security and trust required to create zero-trust hardware architectures for heterogeneous computing systems.
The areas of interest include but are not limited to:
- Roots of Trust and Chain of Trust in hardware
- Link encryption and secure communication channels
- Extending Trusted execution environments to peripherals
- Authentication, Attestation and Encryption in Chiplet based designs
- Authentication, Attestation and Encryption in Composable system architectures
- Hardware based access control and monitoring
- Measuring trust in hardware and systems
- Hardware-based security techniques in edge/cloud systems.
- Paper Submission Deadline: August 12, 2022 (AOE)
- Notification: September 16, 2022
- Camera-Ready: September 30, 2022
- In-Person and Virtual Workshop: November 3, 2022
We welcome three types of submissions: Technical papers with evaluation results, Position papers on directions for research and development and Review papers. Each paper must be 4-6 pages. All accepted papers will be invited to present at the workshop. For more details, please visit the workshop website.
EasyChair link: https://easychair.org/my/conference?conf=ztha2022
Sandhya Koteshwara, Mengmei Ye and Hubertus Franke, IBM Research, USA