• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

FacebookTwitterLinkedInInstagramYoutube
  • Home
  • /Digital Library
  • /Magazines
  • /Sp
  • Home
  • / ...
  • /Magazines
  • /Sp

[CLOSED] Call for Papers: Special Issue on the Impact of Emerging Hardware on Security and Privacy

Important Dates

  • Submissions Due: 13 October 2022
  • Publication: May/June 2023


Recently, we have seen a variety of hardware features released that are designed to improve software security. In the 30 years since the Morris worm, we have found that software-only solutions to prevent memory errors from being exploited are either too expensive to be deployed broadly or are too prone to being circumvented. This situation motivates the use of hardware to implement key defensive features more reliably and efficiently. For example, several hardware features have been introduced that provide fine-grained control of access to memory. In addition, other hardware features provide protected environments to reduce dependence on complex systems software that may be prone to memory errors, limiting the trusted computing base of systems. 

The introduction of these hardware features is a potential boon for improving software security, but several challenges remain. One challenge is to develop software that utilizes such features effectively to achieve desired security goals with low overhead. Only then will we be able to see the wide adoption of such hardware necessary to reduce the exploitation of memory errors broadly. However, another challenge is that these hardware features may have blind spots that create new exploitable attack surfaces that may require yet additional defenses. We must ensure that proposed solutions do not also present new vulnerabilities that adversaries can exploit to circumvent security enforcement. 

This special issue aims at collecting the most relevant ongoing research efforts in the security and privacy field concerning the development, use, and evaluation of new hardware features to improve software security. Topics include, but are not limited to: 

  • Experiences with hardware-enabled security and privacy 
  • Software support for hardware features for security and privacy 
  • Security evaluation of hardware features 
  • Comparison of security capabilities of related hardware features 
  • Lessons in achieving security goals using hardware features 
  • Changes to hardware features to improve security and privacy
  • Market forces and potential for adoption


Submission Guidelines

For author information and guidelines on submission criteria, please visit the S&P's Author Information page. Please submit papers through the ScholarOne system, and be sure to select the special issue name. Manuscripts should not be published or currently submitted for publication elsewhere. Please submit only full papers intended for review, not abstracts, to the ScholarOne portal.


Questions?

Please contact the guest editors at sp3-2023@computer.org.

Guest Editors:

  • Trent Jaeger, Penn State University 
  • Brent ByungHoon Kang, KAIST University 
  • Nele Mentens, Leiden University and KU Leuven 
  • Cynthia Sturton, University of North Carolina

LATEST NEWS
Beyond Benchmarks: How Ecosystems Now Define Leading LLM Families
Beyond Benchmarks: How Ecosystems Now Define Leading LLM Families
From Legacy to Cloud-Native: Engineering for Reliability at Scale
From Legacy to Cloud-Native: Engineering for Reliability at Scale
Announcing the Recipients of Computing's Top 30 Early Career Professionals for 2025
Announcing the Recipients of Computing's Top 30 Early Career Professionals for 2025
IEEE Computer Society Announces 2026 Class of Fellows
IEEE Computer Society Announces 2026 Class of Fellows
MicroLED Photonic Interconnects for AI Servers
MicroLED Photonic Interconnects for AI Servers
Read Next

Beyond Benchmarks: How Ecosystems Now Define Leading LLM Families

From Legacy to Cloud-Native: Engineering for Reliability at Scale

Announcing the Recipients of Computing's Top 30 Early Career Professionals for 2025

IEEE Computer Society Announces 2026 Class of Fellows

MicroLED Photonic Interconnects for AI Servers

Vishkin Receives 2026 IEEE Computer Society Charles Babbage Award

Empowering Communities Through Digital Literacy: Impact Across Lebanon

From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities

Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter