• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Digital Library
  • /Magazine
  • /Mi
  • Home
  • / ...
  • /Magazine
  • /Mi

CLOSED Call for Papers: Special Issue on Security and Privacy-preserving Execution Environments

Important Dates

  • Submissions Due: 15 October 2022
  • Initial Notifications: 4 December 2022
  • Final Version Due: 23 March 2023

Publication: May/June 2023


Security and privacy violations have increased in recent times due to the adversaries exploiting the loopholes in the processor hardware and system designs. The spate of attacks reported in the literature has reinforced a greater need in formulating robust design principles for future generation computer systems. This special issue is to advance the understanding of this critical research topic among the computer architecture, systems and security community researchers.

Contributions are solicited in topics overlapping architecture, operating system and programming models for secure/private execution, but not limited to:

  • Novel designs enhancing security and privacy in GPUs, accelerators, FPGAs
  • Novel cryptographic hardware
  • Designs that enhance security/privacy in post-Moore’s law technologies and quantum computing
  • Metrics for measuring vulnerabilities in hardware and systems
  • Compiler, hardware, and code generation methods to mitigate architecture-induced side/covert channels and other vulnerabilities

  Here are the guidelines for this special issue:

  • Contributions must clearly show the overlap between computer architecture/systems and security. The threat model under consideration must be clearly described.
  • Evaluation of proposed designs must include experimental results or theoretical proofs to show how security or privacy is achieved.
  • Research contributions from prior IEEE International Symposium on Secure and Private Execution Environment Design (SEED) conference are encouraged. All previously published papers must have at least one-third new content compared to any overlapping publication(s). Concurrent submissions are not permitted.
  • Papers that do not match guidelines will be rejected without review.


Submission Guidelines

For author information and guidelines on submission criteria, please visit IEEE Micro's Author Information page. Please submit papers through the ScholarOne system, and be sure to select the special-issue name. Manuscripts should not be published or currently submitted for publication elsewhere. Please submit only full papers intended for review, not abstracts, to the ScholarOne portal.


Questions?

Please contact the guest editors at micro3-23@computer.org.

Guest Editor 

Guru Prasadh Vennkataramani

LATEST NEWS
Case Study: Leveraging Large Language Models to Enhance Data Acquisition Software Quality in Oil & Gas Industry
Case Study: Leveraging Large Language Models to Enhance Data Acquisition Software Quality in Oil & Gas Industry
Case Study: Leveraging Large Language Models to Enhance Data Acquisition Software Quality in Oil & Gas Industry
Case Study: Leveraging Large Language Models to Enhance Data Acquisition Software Quality in Oil & Gas Industry
Quantum Insider Session Series: The Quantum Imperative
Quantum Insider Session Series: The Quantum Imperative
The Evolution of S&P Magazine
The Evolution of S&P Magazine
How to Stand Out in Today's Competitive Software Engineering Job Market
How to Stand Out in Today's Competitive Software Engineering Job Market
Read Next

Case Study: Leveraging Large Language Models to Enhance Data Acquisition Software Quality in Oil & Gas Industry

Case Study: Leveraging Large Language Models to Enhance Data Acquisition Software Quality in Oil & Gas Industry

Quantum Insider Session Series: The Quantum Imperative

The Evolution of S&P Magazine

How to Stand Out in Today's Competitive Software Engineering Job Market

In Memoriam: Remembering Mike Flynn

Engineering Reliable Service Meshes: Practical Insights From Running Istio at Scale

2026: 80th Anniversary

FacebookTwitterLinkedInInstagramYoutube
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter