• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

FacebookTwitterLinkedInInstagramYoutube
  • Home
  • /Digital Library
  • /Journals
  • /Tc
  • Home
  • / ...
  • /Journals
  • /Tc

CLOSED Call for Papers: Special Issue on Hardware Security

The trustworthiness and security of hardware is of paramount importance to full system security, as hardware is the bedrock of all computer systems. Recently discovered vulnerabilities in processors such as Spectre and Meltdown, and emerging trends such as the development and use of open source hardware and open source EDA tools, coupled with the use of machine learning and the relentless push towards smaller technology nodes, creates both challenges and opportunities for innovative technologies for enhancing hardware trust and security. This special issue of IEEE Transactions on Computers will explore academic and industrial research on all topics related to hardware security. Topics of interest to this special issue include, but are not limited to:

  • Design, implementation, and evaluation of “root of trust” elements such as Physical Unclonable Functions (PUFs), random number generators, cryptographic units, and key storage technologies
  • Side channel and fault attacks and countermeasures
  • Architectural support for security and privacy
  • Cryptography and isolation-based approaches to achieve security and privacy
  • Design and evaluation of secure systems
  • Design automation tools and methodologies for hardware security and trust
  • Interdisciplinary studies on security, reliability, usability, and economics

Important Dates

  • Submission Window Opens: February 1, 2022
  • Submission Deadline: March 15, 2022
  • Reviews Completed: April 1, 2022
  • Major Revisions Due: May 1, 2022
  • Reviews of Revisions Completed: June 1, 2022
  • Notification of Final Acceptance: June 15, 2022
  • Publication Materials for Final Manuscripts Due: July 1, 2022
  • Publication: August 2022

Submission Guidelines

For author information and guidelines on submission criteria, please visit the TC Author Information page. Please submit papers through the ScholarOne system, and be sure to select the special-issue name. Manuscripts should not be published or currently submitted for publication elsewhere. Please submit only full papers intended for review, not abstracts, to the ScholarOne portal.

Guest Editors

Simha Sethumadhavan, Columbia University/Chip Scan Inc, simha@columbia.edu

Srini Devadas, MIT, devadas@mit.edu

Corresponding Topical Editor

Nael Abu-Ghazaleh, University of California, Riverside, naelag@ucr.edu

LATEST NEWS
From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities
From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities
IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT
IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT
Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)
Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)
Autonomous Observability: AI Agents That Debug AI
Autonomous Observability: AI Agents That Debug AI
Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference
Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference
Read Next

From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities

IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT

Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)

Autonomous Observability: AI Agents That Debug AI

Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference

Copilot Ergonomics: UI Patterns that Reduce Cognitive Load

The Myth of AI Neutrality in Search Algorithms

Gen AI and LLMs: Rebuilding Trust in a Synthetic Information Age

Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter