Note: All registered and presented special session papers will be submitted for publishing by Springer and made available through SpringerLink Digital Library: INISCOM Conference Proceedings.
Scope
We are witnessing the rapid development of our digital society, which is characterized by the explosion of the number of handheld and IoT devices.
In this context, the security of the end-points is essential, as those objects represent an obvious entry point for attackers.
Actually, the end-points are nowadays entrusted to secure the link starting from the device up to the cloud.
Such end-to-end security is achieved by designing a solid root-of-trust which stems from the device.
It is the role of the “Secure Element” to implement such basic security foundation.
Secure Elements leverage multiple technologies, such as:
- Physically Unclonable Functions (PUFs)
- Advanced cryptography (Lightweight, Post Quantum, etc.)
- Algorithms protected with Side-Channel Analysis (SCA) countermeasures
Meanwhile, attackers are also getting more incentive to break those high-value (and sophisticated) technologies.
In particular, attackers are getting smarter and smarter in that they can now resort to the progress made in Artificial Intelligence (AI) to attack more efficiency.
This special session aims at understanding where we stand as of today in terms of new protections, novel analyses and methods, as well as how can AI serve to detect attackers.
The special session is chaired by Sylvain Guilley, who is a Professor at TELECOM Paris and the CTO & GM of Secure-IC.
Invited speakers:
Sakiyama Kazuo, UEC, Japan
Hayashi Yu-Ichi, NAIST, Japan
Van-Phuc Hoang, LQDTU, Vietnam
Van Thanh Khuat, LQDTU, Vietnam, visiting researcher at TELECOM Paris
Xuan Tu Tran, VNU UET, Vietnam
Bhasin Shivam, NTU, Singapore
Alioto Massimo , NUS, Singapore
elcom
Special session papers should be submitted to the corresponding track in Confyplus paper management system following the conference submission guidelines.to the EAI Community
Topics
- Hardware security mechanisms for IoT
- AI and deep learning applied to embedded security
- Countermeasure, e.g., on PUF and on cryptographic algorithms
- Use-case of actual analysis tools and defense technologies: demo, video, Q&A
Publication
All registered and presented papers will be submitted for publishing by Springer and made available through SpringerLink Digital Library: INISCOM Conference Proceedings.
INISCOM proceedings are indexed in leading indexing services, including Ei Compendex, ISI Web of Science, Scopus, CrossRef, Google Scholar, DBLP, as well as EAI’s own EU Digital Library (EUDL).
Authors of selected papers will be invited to submit an extended version to:
All accepted authors are eligible to submit an extended version in a fast track of:
Additional publication opportunities:
Important dates
Submission Deadline: 21 December 5 February 2021
Notification Deadline: 18 February 2021
Camera-ready Deadline: 4 March 2021
Conference: April 22-23, 2021