• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Digital Library
  • /Magazines
  • /Mi
  • Home
  • / ...
  • /Magazines
  • /Mi

CLOSED Call for Papers: Special Issue on Secure Architectures

IEEE Micro seeks submissions for this special issue.

Submissions due: CLOSED

Initial notifications: Apr 4, 2019

Revised papers due: May 4, 2019

Final notifications: May 10, 2019

Final versions due: May 24, 2019

Publication date: July/Aug 2019

Hardware is the bedrock on which all computing systems are built. Recently developed hardware ideas for enhancing software security from both academia and industry hold significant promise to improve software security. At the same time, recent hardware attacks on current commodity hardware has shown hardware to be a weak foundation for building secure systems. As we enter the post-Moore’s-law era, there are significant questions surrounding what would make security techniques more practical.

IEEE Micro seeks articles on hardware enhanced security and privacy seeks papers on a range of topics, including but not limited to:

– Microarchitectural side-channel attacks and defenses; fault attacks and defenses

– Architectures for key management, attestation, patching and updating firmware and software

– Architectures for isolation and compartmentalization/tamper-proof execution

– Architectures for metadata based approaches to security and privacy

– Architectures for introspection, debugging, and root cause analysis

– Microarchitectural techniques for malware detection and adversarial resistance

– Secure storage, e.g. using emerging non-volatile memories

– Metrics and evaluation methodologies for secure architectures including languages/frameworks for early design stage security exploration

– Approaches to post-Moore’s-law security (secure-accelerator designs will ideally be in the context of an end-to-end application)

– Microarchitectural design patterns for security

– Social processes for creating security in large scale designs

– Secure architectures for domains such as voting machines, implantable medical devices, automotive, Internet of Things, and data centers.

Submission guidelines

Please see the Author Information page and the peer review page for more information. Please submit electronically through ScholarOne Manuscripts, selecting this special-issue option.

Questions?

Contact the guest editors at mi4-2019@computer.org (Simha Sethumadhavan and Mohit Tiwari) or the Editor in Chief Lizy John at ljohn@ece.utexas.edu.

LATEST NEWS
From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities
From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities
IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT
IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT
Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)
Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)
Autonomous Observability: AI Agents That Debug AI
Autonomous Observability: AI Agents That Debug AI
Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference
Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference
Read Next

From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities

IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT

Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)

Autonomous Observability: AI Agents That Debug AI

Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference

Copilot Ergonomics: UI Patterns that Reduce Cognitive Load

The Myth of AI Neutrality in Search Algorithms

Gen AI and LLMs: Rebuilding Trust in a Synthetic Information Age

FacebookTwitterLinkedInInstagramYoutube
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter