• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE-CS_LogoTM-orange
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
IEEE-CS_LogoTM-orange

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2026 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Digital Library
  • /Magazine
  • /Mi
  • Home
  • / ...
  • /Magazine
  • /Mi

CLOSED Call for Papers: Special Issue on Security and Privacy-preserving Execution Environments

Important Dates

  • Submissions Due: 15 October 2022
  • Initial Notifications: 4 December 2022
  • Final Version Due: 23 March 2023

Publication: May/June 2023


Security and privacy violations have increased in recent times due to the adversaries exploiting the loopholes in the processor hardware and system designs. The spate of attacks reported in the literature has reinforced a greater need in formulating robust design principles for future generation computer systems. This special issue is to advance the understanding of this critical research topic among the computer architecture, systems and security community researchers.

Contributions are solicited in topics overlapping architecture, operating system and programming models for secure/private execution, but not limited to:

  • Novel designs enhancing security and privacy in GPUs, accelerators, FPGAs
  • Novel cryptographic hardware
  • Designs that enhance security/privacy in post-Moore’s law technologies and quantum computing
  • Metrics for measuring vulnerabilities in hardware and systems
  • Compiler, hardware, and code generation methods to mitigate architecture-induced side/covert channels and other vulnerabilities

  Here are the guidelines for this special issue:

  • Contributions must clearly show the overlap between computer architecture/systems and security. The threat model under consideration must be clearly described.
  • Evaluation of proposed designs must include experimental results or theoretical proofs to show how security or privacy is achieved.
  • Research contributions from prior IEEE International Symposium on Secure and Private Execution Environment Design (SEED) conference are encouraged. All previously published papers must have at least one-third new content compared to any overlapping publication(s). Concurrent submissions are not permitted.
  • Papers that do not match guidelines will be rejected without review.


Submission Guidelines

For author information and guidelines on submission criteria, please visit IEEE Micro's Author Information page. Please submit papers through the ScholarOne system, and be sure to select the special-issue name. Manuscripts should not be published or currently submitted for publication elsewhere. Please submit only full papers intended for review, not abstracts, to the ScholarOne portal.


Questions?

Please contact the guest editors at micro3-23@computer.org.

Guest Editor 

Guru Prasadh Vennkataramani

LATEST NEWS
Tech Horizons: Building AI Skills and Confidence in Panama’s Youth
Tech Horizons: Building AI Skills and Confidence in Panama’s Youth
TechMovel: Expanding Digital Access in Brazil
TechMovel: Expanding Digital Access in Brazil
InfiLab Podcast: Fueling Your Tech Career with Sowmya Chintakindi
InfiLab Podcast: Fueling Your Tech Career with Sowmya Chintakindi
How Hardware-Level Security Enhances Operational Visibility and Resilience
How Hardware-Level Security Enhances Operational Visibility and Resilience
The Future of Automated Debugging and Software Testing with Harlan D Mills Award Winner Andreas Zeller
The Future of Automated Debugging and Software Testing with Harlan D Mills Award Winner Andreas Zeller
Read Next

Tech Horizons: Building AI Skills and Confidence in Panama’s Youth

TechMovel: Expanding Digital Access in Brazil

InfiLab Podcast: Fueling Your Tech Career with Sowmya Chintakindi

How Hardware-Level Security Enhances Operational Visibility and Resilience

The Future of Automated Debugging and Software Testing with Harlan D Mills Award Winner Andreas Zeller

IEEE CS High-Performance Computing Conference SC Recognized as Fastest Growing Event in 2025

ASTRA 2025: Neuroimaging, Brain-Computer Interfaces, and AI

IEEE Computer Society Launches Software Professional Certification

Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter