M. Brorsson, Zhonghai Lu, G. Agosta, Alessandro Barenghi, Gerardo Pelosi
{"title":"Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems","authors":"M. Brorsson, Zhonghai Lu, G. Agosta, Alessandro Barenghi, Gerardo Pelosi","doi":"10.1145/3031836","DOIUrl":null,"url":null,"abstract":"On behalf of the program and organizing committees, it is a great pleasure to welcome you to the First Workshop on Cryptography and Security in Computing Systems (CS2 2014). The CS2 meeting is a co-located event with HiPEAC 2014 in Vienna, Austria, January 20, 2014. \n \nThe wide diffusion of embedded systems, including multi-core, many-core, and re-configurable platforms, poses a number of challenges related to the security of operations of such systems, as well as of the information stored in them. Malicious adversaries can leverage unprotected communications to hijack cyber-physical systems, resulting in incorrect and potentially highly dangerous behaviors, or can exploit side-channel information leakage, as well as reverse engineering hints, to recover secret information from a computing system. Untrustworthy third party software and hardware can create openings for such attacks, which must be detected and removed or counteracted. In addition, the complexity of modern and future embedded and mobile systems leads to the need to depart from manual planning and deployment of security features. Thus, design automation tools are needed to design and verify the security features of new hardware/software systems. \n \nThe workshop provides a venue for security and cryptography experts to interact with the computer architecture and compilers community, aiming at cross-fertilization and multi-disciplinary approaches to address the security and privacy challenges of computing systems.","PeriodicalId":126518,"journal":{"name":"Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems","volume":"227 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3031836","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
On behalf of the program and organizing committees, it is a great pleasure to welcome you to the First Workshop on Cryptography and Security in Computing Systems (CS2 2014). The CS2 meeting is a co-located event with HiPEAC 2014 in Vienna, Austria, January 20, 2014.
The wide diffusion of embedded systems, including multi-core, many-core, and re-configurable platforms, poses a number of challenges related to the security of operations of such systems, as well as of the information stored in them. Malicious adversaries can leverage unprotected communications to hijack cyber-physical systems, resulting in incorrect and potentially highly dangerous behaviors, or can exploit side-channel information leakage, as well as reverse engineering hints, to recover secret information from a computing system. Untrustworthy third party software and hardware can create openings for such attacks, which must be detected and removed or counteracted. In addition, the complexity of modern and future embedded and mobile systems leads to the need to depart from manual planning and deployment of security features. Thus, design automation tools are needed to design and verify the security features of new hardware/software systems.
The workshop provides a venue for security and cryptography experts to interact with the computer architecture and compilers community, aiming at cross-fertilization and multi-disciplinary approaches to address the security and privacy challenges of computing systems.