CALL FOR PAPERS DATE 2012

                     TRACK A: "Application Design"
                      TOPIC A5: "Secure Systems"

                       ICC, DRESDEN, GERMANY
                        12TH-16TH MARCH 2012
- Paper Submissions           September 11, 2011
- Special Session Proposals   September 11, 2011
- Tutorial Proposals          September 11, 2011
- Notification of Acceptance  November 14, 2011
- Camera-Ready Paper          December 12, 2011
- Conference           http://www.date-conference.com
- Call for Papers      http://www.date-conference.com/final-call-for-papers
- Author Instructions  http://www.date-conference.com/authors-instructions_cfp

The 15th DATE conference and exhibition is the main European event
bringing together designers and design automation users, researchers
and vendors, as well as specialists in the hardware and software
design, test and manufacturing of electronic circuits and systems.

The five-day event consists of a conference with plenary invited
papers, regular papers, panels, hot-topic sessions, tutorials and
workshops, two special focus days and a track for executives. The
scientific conference is complemented by a commercial exhibition. The
organisation of user group meetings, fringe meetings, a university
booth, a PhD forum, vendor presentations and social events offers a
wide variety of extra opportunities to meet and exchange
information. Special space will also be allocated for EU-funded
projects to show their results.

You are invited to submit your research contributions to the Topic

                      SECURE SYSTEMS

Secure systems need a combination of hardware, software and embedded
techniques to succeed. Indeed, the weakest link in the security chain
determines the overall system security. This topic therefore invites
papers on novel technologies and experiences for specific security
problems as well as overall design integration methods for secure
systems-on-chip and embedded systems. Topics of interest are situated
at all design abstraction levels and include novel techniques and
architectures for embedded cryptography; modeling, characterization,
simulation and associated countermeasures for side-channel, fault and
other physical attacks; random numbers generation, embedded secure
processors and co-processors, trusted computing, off-chip memories and
network-on-chip enciphering and integrity checking, trust
establishment and attestation; implementation of security
applications; hardware enabled security, including physically
unclonable functions, and more.

Detailed descriptions of all other topics and submission information
are found on the conference web page:

Papers can be submitted for either formal oral presentation or for
interactive presentation. Oral presentations require novel and
complete research work supported by experimental results. Interactive
presentations are expected to articulate emerging and future design,
verification and test problems including work in progress and identify
open problems that merit innovative future research.

Submissions should not exceed 6 pages in length for oral-presentation
papers and 4 pages in length for interactive-presentation
papers. Submission of 2 page papers in topic A7 (Industrial
Experiences Brief Papers) will also be considered.

Jerome Quevremont, Thales
Patrick Schaumont, Virginia Tech
Ingrid Verbauwhede, K.U.Leuven
Guido Bertoni, ST Microelectronics
Lionel Torres, LIRMM
Laurent Fesquet, TIMA
Maire O'Neill, Queen's University Belfast
Jim Goodman, Kluless Technologies Inc.
Sebastien Riou, Samsung
Francesco Regazzoni, ALaRI


Jerome Quevremont, Thales - TOPIC Chair
email: jerome.quevremont@fr.thalesgroup.com

Patrick Schaumont, Virginia Tech - TOPIC Co-Chair
email: schaum@vt.edu

Lothar Thiele - DATE Program Chair
Swiss Federal Institute of Technology (ETH) Zurich, Switzerland
email: thiele@ethz.ch