Fifth Workshop on Attacks and Solutions in Hardware Security (ASHES) 2021
Event submitted on Thursday, June 10th 2021, approved by Charles Villanueva ✓
This event has been tagged as follows:
The main goal of the ASHES workshop is to provide a speedy and focused venue for hardware security solutions and research, covering both theory and practice. ASHES is mainly interested in developing and molding new challenges throughout the early stages of development. ASHES seeks to leverage significant chances for directing and directing research at its first phase, to productively employ its workshop style and short reaction times; if this is a sector and discipline that you work in – let me know!
Conference Event Summary
The following description was either submitted by the Conference Organizer on Thursday, June 10th 2021, or created by us.
The purpose of the ASHES workshop is to foster solutions for these and any other impending issues in hardware security and to provide the CCS community with a rapid and dedicated forum for general secure hardware research, including both theory and practice. Among other things, ASHES is especially devoted to fostering and shaping new problems at an early stage. This is not limited to the above IoT topics, but also includes any other acute problems in the area as well. Given its workshop format and quick reaction times, ASHES tries to constructively use strong opportunities for guiding and shaping research during its initial phase.
ASHES, therefore, welcomes any convincing contributions to the area, be they foundational, theoretical, or practical in nature. This is also reflected in the four tailor-made paper categories offered by ASHES, namely: SoK-papers; long and short research papers; as well as wild-and-crazy papers, which allow the dissemination of promising ideas to the community at an early stage. In the four-year history of ASHES from 2017 to 2020, authors were making intense use of all three categories. We would hope to see this trend continuing this year if the workshop proposal is accepted.
All accepted ASHES papers will appear in the ASHES workshop proceedings of ACM CCS in the ACM Digital Library. In addition, all authors of accepted ASHES papers will be invited to submit an extended version of their work to a special ASHES issue at the Journal of Cryptographic Engineering (JCEN).