• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Digital Library
  • /Magazines
  • /Mi
  • Home
  • / ...
  • /Magazines
  • /Mi

CLOSED Call for Papers: Special Issue on Secure Architectures

IEEE Micro seeks submissions for this special issue.

Submissions due: CLOSED Initial notifications: Apr 4, 2019 Revised papers due: May 4, 2019 Final notifications: May 10, 2019 Final versions due: May 24, 2019 Publication date: July/Aug 2019 Hardware is the bedrock on which all computing systems are built. Recently developed hardware ideas for enhancing software security from both academia and industry hold significant promise to improve software security. At the same time, recent hardware attacks on current commodity hardware has shown hardware to be a weak foundation for building secure systems. As we enter the post-Moore’s-law era, there are significant questions surrounding what would make security techniques more practical. IEEE Micro seeks articles on hardware enhanced security and privacy seeks papers on a range of topics, including but not limited to: – Microarchitectural side-channel attacks and defenses; fault attacks and defenses – Architectures for key management, attestation, patching and updating firmware and software – Architectures for isolation and compartmentalization/tamper-proof execution – Architectures for metadata based approaches to security and privacy – Architectures for introspection, debugging, and root cause analysis – Microarchitectural techniques for malware detection and adversarial resistance – Secure storage, e.g. using emerging non-volatile memories – Metrics and evaluation methodologies for secure architectures including languages/frameworks for early design stage security exploration – Approaches to post-Moore’s-law security (secure-accelerator designs will ideally be in the context of an end-to-end application) – Microarchitectural design patterns for security – Social processes for creating security in large scale designs – Secure architectures for domains such as voting machines, implantable medical devices, automotive, Internet of Things, and data centers. Submission guidelines Please see the Author Information page and the peer review page for more information. Please submit electronically through ScholarOne Manuscripts, selecting this special-issue option. Questions? Contact the guest editors at mi4-2019@computer.org (Simha Sethumadhavan and Mohit Tiwari) or the Editor in Chief Lizy John at ljohn@ece.utexas.edu.
LATEST NEWS
Securing the Software Supply Chain: Challenges, Tools, and Regulatory Forces
Securing the Software Supply Chain: Challenges, Tools, and Regulatory Forces
Computing’s Top 30: Tejas Padliya
Computing’s Top 30: Tejas Padliya
Reimagining Infrastructure and Systems for Scientific Discovery and AI Collaboration
Reimagining Infrastructure and Systems for Scientific Discovery and AI Collaboration
IEEE 2881: Learning Metadata Terms (LMT) Empowers Learning in the AI Age
IEEE 2881: Learning Metadata Terms (LMT) Empowers Learning in the AI Age
Platform Engineering: Bridging the Developer Experience Gap in Enterprise Software Development
Platform Engineering: Bridging the Developer Experience Gap in Enterprise Software Development
Read Next

Securing the Software Supply Chain: Challenges, Tools, and Regulatory Forces

Computing’s Top 30: Tejas Padliya

Reimagining Infrastructure and Systems for Scientific Discovery and AI Collaboration

IEEE 2881: Learning Metadata Terms (LMT) Empowers Learning in the AI Age

Platform Engineering: Bridging the Developer Experience Gap in Enterprise Software Development

IEEE Std 3158.1-2025 — Verifying Trust in Data Sharing: Standard for Testing and Performance of a Trusted Data Matrix System

IEEE Std 3220.01-2025: Standard for Consensus Framework for Blockchain System

Mapping the $85B AI Processor Landscape: Global Startup Surge, Market Consolidation Coming?

FacebookTwitterLinkedInInstagramYoutube
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter