LEADER 03216nam 2200349 450 001 9910375680103321 005 20230821003013.0 035 $a(CKB)4100000007598001 035 $a(NjHacI)994100000007598001 035 $a(EXLCZ)994100000007598001 100 $a20230821d2018 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aProceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security /$fChip Hong Chang 210 1$aNew York NY :$cACM,$d2018. 215 $a1 online resource (6 pages) 311 $a1-4503-5996-5 330 $aIt is our great pleasure to welcome you to the Second Workshop on Attacks and Solutions in Hardware Security 2018 (ASHES 2018), a post-conference satellite workshop of the ACM Conference on Computer and Communications Security 2018 (CCS 2018) in Toronto, Canada! ASHES deals with all aspects of hardware security, and welcomes any contributions to this area. Besides being a forum for mainstream hardware security research, its mission is to specifically foster new concepts, solutions, and methodological approaches, and to promote new application scenarios. This includes, for example, new attack vectors on secure hardware, the merger of nanotechnology and hardware security, novel designs and materials, lightweight security hardware, and physical unclonable functions (PUFs) on the methodological side, as well as the internet of things, automotive security, smart homes, supply chain security, pervasive and wearable computing on the applications side. ASHES thereby aims at giving researchers and practitioners a unique opportunity to share their perspectives with others on various emerging aspects of hardware security research. In order to account for hardware security as a rapidly developing discipline, ASHES routinely offers four categories of submission: Full papers; Short papers;Systematization of Knowledge (SoK) papers, which structure or survey a certain subarea within hardware security; Wild and Crazy (WaC) papers, whose aim is to distribute a promising and potentially seminal research idea at an early stage to the community. Our call for papers this year attracted 30 submissions overall, of which 27 were conforming to submission and formatting requirements. This marks an increase of 50 percent compared to last year, where ASHES 2017 had received 20 submissions. Two submissions fell into the wild-andcrazy paper category; one into the systematization of knowledge category; the rest were regular full and short papers. Geographically, the different co-authors of submissions this year were associated with institutions in the US (18), closely followed by Europe (13), and India (1). 606 $aElectronic data processing$vCongresses 615 0$aElectronic data processing 676 $a004 700 $aChang$b Chip Hong$0953827 712 02$aAssociation for Computing Machinery-Digital Library, 801 0$bNjHacI 801 1$bNjHacl 906 $aBOOK 912 $a9910375680103321 996 $aProceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security$92156642 997 $aUNINA