第四届计算机系统密码学与安全研讨会论文集

M. Brorsson, Zhonghai Lu, G. Agosta, Alessandro Barenghi, Gerardo Pelosi
{"title":"第四届计算机系统密码学与安全研讨会论文集","authors":"M. Brorsson, Zhonghai Lu, G. Agosta, Alessandro Barenghi, Gerardo Pelosi","doi":"10.1145/3031836","DOIUrl":null,"url":null,"abstract":"On behalf of the program and organizing committees, it is a great pleasure to welcome you to the First Workshop on Cryptography and Security in Computing Systems (CS2 2014). The CS2 meeting is a co-located event with HiPEAC 2014 in Vienna, Austria, January 20, 2014. \n \nThe wide diffusion of embedded systems, including multi-core, many-core, and re-configurable platforms, poses a number of challenges related to the security of operations of such systems, as well as of the information stored in them. Malicious adversaries can leverage unprotected communications to hijack cyber-physical systems, resulting in incorrect and potentially highly dangerous behaviors, or can exploit side-channel information leakage, as well as reverse engineering hints, to recover secret information from a computing system. Untrustworthy third party software and hardware can create openings for such attacks, which must be detected and removed or counteracted. In addition, the complexity of modern and future embedded and mobile systems leads to the need to depart from manual planning and deployment of security features. Thus, design automation tools are needed to design and verify the security features of new hardware/software systems. \n \nThe workshop provides a venue for security and cryptography experts to interact with the computer architecture and compilers community, aiming at cross-fertilization and multi-disciplinary approaches to address the security and privacy challenges of computing systems.","PeriodicalId":126518,"journal":{"name":"Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems","volume":"227 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems\",\"authors\":\"M. Brorsson, Zhonghai Lu, G. Agosta, Alessandro Barenghi, Gerardo Pelosi\",\"doi\":\"10.1145/3031836\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"On behalf of the program and organizing committees, it is a great pleasure to welcome you to the First Workshop on Cryptography and Security in Computing Systems (CS2 2014). The CS2 meeting is a co-located event with HiPEAC 2014 in Vienna, Austria, January 20, 2014. \\n \\nThe wide diffusion of embedded systems, including multi-core, many-core, and re-configurable platforms, poses a number of challenges related to the security of operations of such systems, as well as of the information stored in them. Malicious adversaries can leverage unprotected communications to hijack cyber-physical systems, resulting in incorrect and potentially highly dangerous behaviors, or can exploit side-channel information leakage, as well as reverse engineering hints, to recover secret information from a computing system. Untrustworthy third party software and hardware can create openings for such attacks, which must be detected and removed or counteracted. In addition, the complexity of modern and future embedded and mobile systems leads to the need to depart from manual planning and deployment of security features. Thus, design automation tools are needed to design and verify the security features of new hardware/software systems. \\n \\nThe workshop provides a venue for security and cryptography experts to interact with the computer architecture and compilers community, aiming at cross-fertilization and multi-disciplinary approaches to address the security and privacy challenges of computing systems.\",\"PeriodicalId\":126518,\"journal\":{\"name\":\"Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems\",\"volume\":\"227 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-01-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3031836\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3031836","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

我代表项目和组织委员会,非常高兴地欢迎您参加第一届计算系统密码学和安全研讨会(CS2 2014)。CS2会议于2014年1月20日在奥地利维也纳与HiPEAC 2014同时举行。嵌入式系统的广泛普及,包括多核、多核和可重新配置的平台,对这些系统的操作安全性以及存储在其中的信息提出了许多挑战。恶意的攻击者可以利用未受保护的通信来劫持网络物理系统,导致不正确和潜在的高度危险的行为,或者可以利用侧信道信息泄漏,以及逆向工程提示,从计算系统中恢复秘密信息。不可信的第三方软件和硬件可以为此类攻击创造机会,必须检测并消除或抵消这些攻击。此外,现代和未来嵌入式和移动系统的复杂性导致需要脱离手动规划和部署安全功能。因此,需要设计自动化工具来设计和验证新硬件/软件系统的安全特性。研讨会为安全和密码学专家提供了一个与计算机体系结构和编译器社区互动的场所,旨在通过交叉施肥和多学科方法来解决计算系统的安全和隐私挑战。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems
On behalf of the program and organizing committees, it is a great pleasure to welcome you to the First Workshop on Cryptography and Security in Computing Systems (CS2 2014). The CS2 meeting is a co-located event with HiPEAC 2014 in Vienna, Austria, January 20, 2014. The wide diffusion of embedded systems, including multi-core, many-core, and re-configurable platforms, poses a number of challenges related to the security of operations of such systems, as well as of the information stored in them. Malicious adversaries can leverage unprotected communications to hijack cyber-physical systems, resulting in incorrect and potentially highly dangerous behaviors, or can exploit side-channel information leakage, as well as reverse engineering hints, to recover secret information from a computing system. Untrustworthy third party software and hardware can create openings for such attacks, which must be detected and removed or counteracted. In addition, the complexity of modern and future embedded and mobile systems leads to the need to depart from manual planning and deployment of security features. Thus, design automation tools are needed to design and verify the security features of new hardware/software systems. The workshop provides a venue for security and cryptography experts to interact with the computer architecture and compilers community, aiming at cross-fertilization and multi-disciplinary approaches to address the security and privacy challenges of computing systems.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信