-
Notifications
You must be signed in to change notification settings - Fork 1
/
index.html
117 lines (113 loc) · 8.15 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
<!doctype html>
<html>
<head>
<title>ZTHA@ICCAD 2023</title>
<meta name="google-site-verification" content="WqwMCzPzuaoGSt00XXBernSWD5Jw0kSkY5BcrHBSmZ0" />
<meta name="description" content="Zero Trust Hardware Architectures Workshop ZTHA@ICCAD'23">
<meta property="og:url" content="https://zerotrustworkshopiccad.github.io"/>
<meta property="og:title" content="ZTHA 2023"/>
<meta property="og:description" content="Zero Trust Hardware Architectures Workshop ZTHA@ICCAD'23"/>
<meta property="og:image" content="https://github.com/zerotrustworkshopiccad/zerotrustworkshopiccad.github.io/blob/main/image/ZTHA_2.png" />
<meta property="og:site_name" content="ZTHA"/>
<meta charset="utf-8" name="viewport" content="width=device-width, initial-scale=1">
<meta name="twitter:card" content="summary_large_image">
<meta name="twitter:site" content="@ZTHA_ICCAD2023">
<meta name="twitter:title" content="ZTHA 2023">
<meta name="twitter:description" content="Zero Trust Hardware Architectures Workshop ZTHA@ICCAD'23">
<meta name="twitter:image" content="https://github.com/zerotrustworkshopiccad/zerotrustworkshopiccad.github.io/blob/main/image/ZTHA_2.png">
<meta name="twitter:url" value="https://zerotrustworkshopiccad.github.io" />
<meta name="twitter:label1" value="Submission Deadline" />
<meta name="twitter:data1" value="September 24, 2023" />
<link href="css/frame.css" media="screen" rel="stylesheet" type="text/css" />
<link href="css/controls.css" media="screen" rel="stylesheet" type="text/css" />
<link href="css/custom.css" media="screen" rel="stylesheet" type="text/css" />
<link rel="canonical" href="https://zerotrustworkshopiccad.github.io/">
<link rel="stylesheet" href="https://stackpath.bootstrapcdn.com/bootstrap/4.4.1/css/bootstrap.min.css">
<link href='https://fonts.googleapis.com/css?family=Open+Sans:400,700' rel='stylesheet' type='text/css'>
<link href='https://fonts.googleapis.com/css?family=Open+Sans+Condensed:300,700' rel='stylesheet' type='text/css'>
<link href="https://fonts.googleapis.com/css?family=Source+Sans+Pro:400,700" rel="stylesheet">
<script src="https://ajax.googleapis.com/ajax/libs/jquery/3.3.1/jquery.min.js"></script>
<script src="js/menu.js"></script>
<style>
.menu-index {
color: rgb(255, 255, 255) !important;
opacity: 1 !important;
font-weight: 700 !important;
}
</style>
</head>
<body>
<!-------------------------------------------------------------------------------------------->
<!--Menu and Banner-->
<div class="menu-container"></div>
<div class="site-blocks-cover overlay inner-page-cover" style="background-image: url('image/geometric-background-2675011_1280.jpg');"
data-stellar-background-ratio="0.5">
<div class="container">
<div class="row align-items-center justify-content-center">
<div class="col-md-10 text-center" data-aos="fade-up">
<p></p>
<h1>Zero Trust Hardware Architectures Workshop (ZTHA)</h1>
<hr>
<h5>Co-located with 2023 <u><a href="https://iccad.com/">International Conference on Computer-Aided Design (ICCAD)</a></u> </h5>
<h4>Thursday, November 2, 2023</h4>
<h4>In-person Workshop</h4>
<p></p>
</div>
</div>
</div>
</div>
<!-------------------------------------------------------------------------------------------->
<div class="content-container">
<div class="content">
<div class="content-table flex-column">
<div class="flex-row">
<!--Start Overview-->
<div class="flex-item flex-column">
<h2 class="add-top-margin">Overview <a href="pdf/cfp_ztha_2023.pdf" target="_blank">[Call for Talks]</a></h2>
<hr>
<p class="text text-justify">
In recent times, there has been a major push and urgency to adopt the zero-trust model for cybersecurity. The zero trust model is based on the principle of “never trust, always verify” and is aimed at eliminating all implicit trust in a system. While adopting a zero-trust model for network security generally involves authenticating, authorizing and continuously validating the credentials of users in a network, these measures alone are not enough to create a true zero trust based architecture. The underlying hardware needs to be trusted and secured as well. Thus, novel approaches for building zero trust architectures, from systems all the way down to silicon, is one of the big challenges for next generation hardware system design.
</p>
<p class="text text-justify">
Traditionally, research on establishing trust and security in hardware has primarily focused on the host and its associated memory subsystems. These include principles of trusted execution environments, silicon roots of trust, Trusted Platform Modules, encryption at rest etc. However, in modern system architectures such as edge/cloud computing, composable systems and chiplet based integrated circuits, the realm of trust needs to be extended beyond the host system and incorporate many hardware devices and IPs. In view of threats such as compromised supply chain integrity, counterfeit chips, hardware trojan implants, malicious firmware, malware, etc., it is important to establish trust in hardware components and to communicate trust between different components of a system. The different kinds of communication could range from that between different IPs inside a SoC, between a host and its attached peripherals, as well as between chiplets inside a multi-chip module. Trust also needs to be established and revoked in a dynamic manner, with the ability to handle large number of subcomponents in the design. Thus, a new set of protocols that can work to establish trust and security in these new types of system architectures has become necessary. While some of these protocols are being developed as industry and government standards, large-scale effort is required to bring them to adoption. It is equally important to develop open source and verifiable hardware designs that can bring security without compromising system parameters such as performance or functionality. The focus of this workshop will be on all aspects of security and trust required to create zero-trust hardware architectures for heterogeneous computing systems.
</p>
</div>
</div>
<!--Start Topics-->
<div class="flex-row">
<div class="flex-item flex-column">
<h2 class="add-top-margin">Topics of interest</h2>
<hr>
<p class="text">The areas of interest include but are not limited to: </p>
<ul>
<li>Extending confidential computing or Trusted Execution Environments to peripherals</li>
<li>Building trust in novel computing architectures such as composable processors/composable systems</li>
<li>Enabling trust in novel packaging technologies such as Heterogeneous Integration/System-in-Package/Chiplets</li>
<li>Secure and trusted integration of AI cores or AI chiplets in heterogeneous systems/circuits</li>
<li>Supply chain security of hardware and firmware</li>
<li>Hardware-Enabled security for Cloud and Edge computing </li>
<li>Role of open-source designs and standards for security and trust</li>
<li>Other emerging topics in security and trust such as post-quantum cryptography, homomorphic encryption, secure multi-party computation etc.</li>
</ul>
</div>
</div>
<div class="flex-row">
<div class="flex-item flex-column">
<hr>
<p class="text">
Contact: <a href="mailto:[email protected]">[email protected]</a>
</p>
</div>
</div>
</div>
<!-------------------------------------------------------------------------------------------->
<div class="flex-row">
<div class="flex-item flex-column">
<p>© ZTHA: Zero Trust Hardware Architectures Workshop@ICCAD, 2023</p>
</div>
</div>
</div>
</div>
</div>
</body>
</html>