• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE-CS_LogoTM-orange
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
IEEE-CS_LogoTM-orange

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2026 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Digital Library
  • /Magazine
  • /Mi
  • Home
  • / ...
  • /Magazine
  • /Mi

CLOSED Call for Papers: Special Issue on Security and Privacy-preserving Execution Environments

Important Dates

  • Submissions Due: 15 October 2022
  • Initial Notifications: 4 December 2022
  • Final Version Due: 23 March 2023

Publication: May/June 2023


Security and privacy violations have increased in recent times due to the adversaries exploiting the loopholes in the processor hardware and system designs. The spate of attacks reported in the literature has reinforced a greater need in formulating robust design principles for future generation computer systems. This special issue is to advance the understanding of this critical research topic among the computer architecture, systems and security community researchers.

Contributions are solicited in topics overlapping architecture, operating system and programming models for secure/private execution, but not limited to:

  • Novel designs enhancing security and privacy in GPUs, accelerators, FPGAs
  • Novel cryptographic hardware
  • Designs that enhance security/privacy in post-Moore’s law technologies and quantum computing
  • Metrics for measuring vulnerabilities in hardware and systems
  • Compiler, hardware, and code generation methods to mitigate architecture-induced side/covert channels and other vulnerabilities

  Here are the guidelines for this special issue:

  • Contributions must clearly show the overlap between computer architecture/systems and security. The threat model under consideration must be clearly described.
  • Evaluation of proposed designs must include experimental results or theoretical proofs to show how security or privacy is achieved.
  • Research contributions from prior IEEE International Symposium on Secure and Private Execution Environment Design (SEED) conference are encouraged. All previously published papers must have at least one-third new content compared to any overlapping publication(s). Concurrent submissions are not permitted.
  • Papers that do not match guidelines will be rejected without review.


Submission Guidelines

For author information and guidelines on submission criteria, please visit IEEE Micro's Author Information page. Please submit papers through the ScholarOne system, and be sure to select the special-issue name. Manuscripts should not be published or currently submitted for publication elsewhere. Please submit only full papers intended for review, not abstracts, to the ScholarOne portal.


Questions?

Please contact the guest editors at micro3-23@computer.org.

Guest Editor 

Guru Prasadh Vennkataramani

LATEST NEWS
Why Your Computer Science Degree Is No Longer Enough in 2026
Why Your Computer Science Degree Is No Longer Enough in 2026
Episode 2 | Grow Your Career in Hardware Engineering
Episode 2 | Grow Your Career in Hardware Engineering
Computing’s Top 30: Hariharan Rogothaman
Computing’s Top 30: Hariharan Rogothaman
Computing’s Top 30: Amod Agrawal
Computing’s Top 30: Amod Agrawal
IEEE Quantum Week 2026 to Unveil the Latest in Quantum Computing
IEEE Quantum Week 2026 to Unveil the Latest in Quantum Computing
Read Next

Why Your Computer Science Degree Is No Longer Enough in 2026

Episode 2 | Grow Your Career in Hardware Engineering

Computing’s Top 30: Hariharan Rogothaman

Computing’s Top 30: Amod Agrawal

IEEE Quantum Week 2026 to Unveil the Latest in Quantum Computing

Creating the Next Generation of Connected Autonomous Systems: an Interview with Weisong Shi on Edge Computing, Autonomous Driving, and the Future of Mobility

Call for Nominations: IEEE Computer Society Opens Submissions for the “AI’s 10 to Watch” Award

Episode 1 | Interview with Michelle Tomes

Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter