Key Dates Full Papers

Paper Submission Deadline

February 11, 2020
January 28, 2020

Author Notification

March 29, 2020
March 15, 2020

Final Papers Due

April 19, 2020
April 5, 2020


Submit your paper here

Download CFP

TXT Format PDF Format


Previous Conferences

2019, 2018, 2017, 2016, 2015, 2014, 2013, 2012, 2011, 2010, 2009, 2008, 2007, 2006, 2005, 2004

General Co-Chairs

Maurizio Palesi
University of Catania, IT
Gianluca Palermo
Politecnico di Milano, IT

Program Co-Chairs

Cat Graves
Hewlett Packard Labs, US
Eishi Arima
ITC University of Tokyo, JP

For more information, visit the website at


Computing Frontiers 2020 will feature co-located workshops. Submission of papers to the workshops is handled separately from the main conference. Please refer to the websites of the workshops for submission deadlines and more details.

Malicious Software and Hardware in Internet of Things (MaL-IoT '20)

Aim and scope:
Cyber-physical and smart embedded systems, already highly networked, will be even more connected in the near future to form the Internet of Things, handling large amount of private and safety critical data. The pervasive diffusion of these devices will create several threats to privacy and could open new possibilities for attackers, since the security of even large portions of the Internet of Things could be harmed by compromising a reduced number of components. The possibility of securely updating devices should be guaranteed and it should be possible to verify and assert the root of trust of components. With respect to this context we expect contributions in different areas of security in Internet of Things. Topics of the workshop include but are not limited to:

  1. Malicious firmware design and detection
  2. Malware in Internet of Things applications
  3. Hardware root of trust
  4. Privacy issues of smart-home systems and complex systems
  5. Hardware Trojans and their effects on systems
  6. Hardware authentication and IP protection
  7. Secure communication and key-management
  8. Implementation attacks and countermeasures
  9. Emerging threats and attack vectors in the Internet of Things
  10. Supply chain security

Workshop Website: Coming soon.

Organizers: Francesco Regazzoni (AlaRI - USI), Paolo Palmieri (University College of Cork)

6th Workshop on Design of Low Power EMbedded Systems (LP-EMS '20)

Aim and Scope:

Workshop Website: Coming soon.

Organizers: Paolo Meloni, Francesco Conti