***********************************************************************
                  CS2 2019, CALL FOR CONTRIBUTIONS
                         Sixth Workshop on
             Cryptography and Security in Computing Systems

  Co-located with HiPEAC 2019 Conference, Valencia 21 January 2019
                   http://www.cs2.deib.polimi.it
***********************************************************************

Scope
The wide diffusion of embedded systems, including multi-core, many-core, and
reconfigurable platforms, poses a number of challenges related to the security
of the operation of such systems, as well as of the information stored in them.
Malicious adversaries can leverage unprotected communication to hijack
cyber-physical systems, resulting in incorrect and potentially highly dangerous
behaviours, or can exploit side channel information leakage to recover secret
information from a computing system. Untrustworthy third party software and
hardware can create openings for such attacks, which must be detected and
removed or countered. The prevalence of multi/many core systems opens additional
issues such as NoC security. Finally, the complexity on modern and future
embedded and mobile systems leads to the need to depart from manual planning and
deployment of security features. Thus, design automation tools will be needed to
design and verify the security features of new hardware/software systems.

The workshop is a venue for security and cryptography experts to interact with
the computer architecture and compilers community, aiming at cross-fertilization
and multi-disciplinary approaches to security in computing systems.

Topics of interest include, but are not limited to:


  *  Compiler and Runtime Support for Security
  *  Cryptography in Embedded and Reconfigurable Systems
  *  Design Automation and Verification of Security
  *  Efficient Cryptography through Multi/Many core Systems
  *  Fault Attacks and Countermeasures, including interaction with
     Fault Tolerance
  *  Hardware Architecture and Extensions for Cryptography
  *  Hardware/Software Security Techniques
  *  Hardware Trojans and Reverse Engineering
  *  Physical Unclonable Functions
  *  Reliability & Privacy in Embedded Systems
  *  Security of Cyberphysical Systems
  *  Security of Networks-on-Chips and Multi-core Architectures
  *  Side Channel Attacks and Countermeasures
  *  Engineering and efficient implementation of post-quantum
     cryptographic primitives

The workshop seeks submissions from academia and industry, presenting novel
research contributions and industrial case studies.

Important Dates
    Paper Submission: November 15, 2018
    Acceptance Notification: December 15, 2018
    Camera Ready Version: December 21, 2018

Information for authors
All submissions must be written in English, and should be anonymized. All papers
will be double-blind refereed. Regular submissions should be at most 6 pages in
the ACM double-column format including bibliography. Please, use the following
template when preparing your manuscript:
http://www.acm.org/publications/article-templates/proceedings-template.html

Authors must submit their papers (in PDF format) by the deadline indicated
above, using the EasyChair web site:
  https://easychair.org/conferences/?conf=cs2-2019

Workshop Organizers:
Giovanni Agosta, Politecnico di Milano, Italy
Karine Heydemann, Sorbonne Universite', France
Alessandro Barenghi, Politecnico di Milano, Italy
Gerardo Pelosi, Politecnico di Milano, Italy

If you have any question,
please contact the program chairs at cs2chair@polimi.it

HiPEAC 2019 home page: http://www.hipeac.net/conference/valencia