Workshop on Trustworthy Hardware
Hardware security and trustworthy hardware are on the brink of a revolution and this workshop and the resulting special issue/book seek to showcase the latest advances in state-of-the-art trustworthy hardware and identify the most promising research frontiers in IC and system security. The scope of this workshop spans critical aspects of IC and system security ranging from theoretical and conceptual foundations, synthesis, testing and veriﬁcation, to modeling and optimization to case studies. From a platforms perspective this workshop/special issue will cover IC and system security and trust issues in ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems. Other topics of interest include: Hardware security primitives (circuitry and mechanisms) including IDs, PUFs, PPUFs, public TRNGs, side channels, dual rail logic, controlled aging, IC conditioning, watermarking, ﬁngerprinting, and obfuscation; Hardware-based security protocols including DRM (IC metering, enabling and disabling), trust guarantees, authentication, privacy, hardware-based PKC; Hardware attacks: creation, detection, characterization, and compensation; Forensic and reverse engineering (e.g. process, IC, models, algorithms); Computer aided design (CAD) techniques for IC and System Security; Trusted synthesis and compilation using untrustworthy CAD tools; Trusted hardware based system security; Impact of nano and other emerging technologies on hardware-based system security; Hardware-supported primitives and protocols for operating systems and utility software.
Goal : This workshop will identify important topics in hardware trust that are relevant to industry and DoD.