Journal Menu► ▼ Journal Menu
Journal Browser► ▼ Journal Browser
Special Issue "Physical Layer Security and Trust for Legacy Systems and Supply Chain Assurance"
A special issue of Cryptography (ISSN 2410-387X). This special issue belongs to the section "Hardware Security".
Deadline for manuscript submissions: closed (31 July 2018) | Viewed by 41465
Special Issue Editor
Interests: hardware security and trust and design for manufacturability
Special Issues, Collections and Topics in MDPI journals
Special Issue in Cryptography: Feature Papers in Hardware Security
Special Issue in Cryptography: Feature Papers in Hardware Security II
Special Issue Information
Physical-layer security and trust of microelectronic systems is threatened by powerful side-channel signal acquisition attacks, semi-invasive probing and sophisticated reverse engineering process flows. Legacy systems are particularly vulnerable and the large investment in current deployments of cyber-physical systems across medical, military, industrial, and critical infrastructures makes it imperative that these systems are retrofit with countermeasures designed to improve their situational-awareness and resilience to attacks, such as illegal firmware updates and information theft through side-channels. Many of these systems are not resource-constrained and therefore a wide-range of opportunities exist to outfit these legacy systems with novel primitives and additional layers to harden their security inner and outer shells. Techniques that provide a root-of-trust through, for example, secure boot, and/or provide intra-SoC (system on a chip) security firewalls between IP blocks would further improve the resilience of both legacy and emerging systems. Similarly, methods that establish provenance and provide assurance of authenticity of chips and systems as they move through the supply chain would also greatly alleviate security concerns related to early-life failures and hidden back door access mechanisms in newly deployed systems. This Special Issue is seeking original works that address security and trust challenges across and/or within this range of topics.
The topics of interest to this Special Issue cover the scope of the IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (http://www.hostsymposium.org/).
Extended versions of papers presented at HOST 2018 are sought, but this call for papers is also fully open to all those who wish to contribute by submitting a relevant research manuscript.
Prof. Dr. Jim Plusquellic
Manuscript Submission Information
Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.
Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Cryptography is an international peer-reviewed open access quarterly journal published by MDPI.
Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.
- Physical-layer security
- Side-channel countermeasures
- Security and trust in legacy and emerging IoT
- Supply chain assurance