Key Dates Full Papers

Paper Submission Deadline

January 28, 2020

Author Notification

March 15, 2020

Final Papers Due

April 5, 2020


Submission

Submit your paper here


Download CFP

TXT Format PDF Format


Sponsors


Previous Conferences

2019, 2018, 2017, 2016, 2015, 2014, 2013, 2012, 2011, 2010, 2009, 2008, 2007, 2006, 2005, 2004


General Co-Chairs

Maurizio Palesi
University of Catania, IT
Gianluca Palermo
Politechnico di Milano, IT

Program Co-Chairs

Cat Graves
Hewlett Packard Labs, US
Eishi Arima
ITC University of Tokyo, JP




For more information, visit the website at www.computingfrontiers.org

Workshops

Computing Frontiers 2020 will feature co-located workshops. Submission of papers to the workshops is handled separately from the main conference. Please refer to the websites of the workshops for submission deadlines and more details.

Malicious Software and Hardware in Internet of Things (MaL-IoT '20)

Aim and scope:
Cyber-physical and smart embedded systems, already highly networked, will be even more connected in the near future to form the Internet of Things, handling large amount of private and safety critical data. The pervasive diffusion of these devices will create several threats to privacy and could open new possibilities for attackers, since the security of even large portions of the Internet of Things could be harmed by compromising a reduced number of components. The possibility of securely updating devices should be guaranteed and it should be possible to verify and assert the root of trust of components. With respect to this context we expect contributions in different areas of security in Internet of Things. Topics of the workshop include but are not limited to:

  1. Malicious firmware design and detection
  2. Malware in Internet of Things applications
  3. Hardware root of trust
  4. Privacy issues of smart-home systems and complex systems
  5. Hardware Trojans and their effects on systems
  6. Hardware authentication and IP protection
  7. Secure communication and key-management
  8. Implementation attacks and countermeasures
  9. Emerging threats and attack vectors in the Internet of Things
  10. Supply chain security

Workshop Website: Coming soon.

Organizers: Francesco Regazzoni (AlaRI - USI), TBD



Sponsors