The 15th International Workshop on Security and High Performance Computing Systems (SHPCS 2020)
CALL FOR PAPERS & PARTICIPATION
Submissions could be for full papers, short papers, poster papers, or posters
You are invited to submit original and unpublished research works on above and other topics related to Security and HPC in each local and distributed application fields (e.g. Many-core, Grid, mobile, etc.). Submitted papers must not have been published or simultaneously submitted elsewhere until it appears in HPCS proceedings, in the case of acceptance, or notified otherwise. Submission can be for
- Regular papers, please submit a PDF copy of your full manuscript, not to exceed 8 double-column formatted pages per template, and include up to 6 keywords and an abstract of no more than 400 words. Additional pages will be charged additional fee. Submission should include a cover page with authors' names, affiliation addresses, fax numbers, phone numbers, and all authors email addresses. Please, indicate clearly the corresponding author(s) although all authors are equally responsible for the manuscript.
- Short papers (up to 4 pages), please submit a PDF copy of your full manuscript, not to exceed 4 double-column formatted pages per template, and include up to 6 keywords and an abstract of no more than 400 words. Additional pages will be charged additional fee. Submission should include a cover page with authors' names, affiliation addresses, fax numbers, phone numbers, and all authors email addresses. Please, indicate clearly the corresponding author(s) although all authors are equally responsible for the manuscript.
- Poster papers and Posters (please refer to http://hpcs2020.cisedu.info/1-call-for-papers-and-participation/call-for-posters for posters submission details) will also be considered.
Please specify the type of submission you have. Please include page numbers on all preliminary submissions to make it easier for reviewers to provide helpful comments.
Submit a PDF copy of your full manuscript to the Workshop's paper submission site at xxx. Acknowledgement will be sent within 48 hours of submission.
Only PDF files will be accepted, uploaded to the submission link above. Each paper will receive a minimum of three reviews. Papers will be selected based on their originality, relevance, significance, technical clarity and soundness, presentation, language, and references. Submission implies the willingness of at least one of the authors to register and present the paper, if accepted. At least one of the authors of each accepted paper will have to register and attend (virtually) the HPCS 2020 conference to present the paper at the Symposium as scheduled. By submitting the paper to the HPCS conference, all authors agree to abide by all HPCS conference paper submission, publication and presentation policies as well as following ethical and professional codes of conduct, including those of the professional co-sponsoring organizations. For more information, please refer to the Authors Info and Registration Info pages.
Accepted papers will be published in the Conference proceedings. Instructions for final manuscript format and requirements will be posted on the HPCS 2020 Conference web site. It is our intent to have the proceedings formally published in hard and soft copies and be available at the time of the conference. The proceedings is projected to be included in the IEEE or ACM Digital Library and indexed in all major indexing services accordingly.
Plans are underway to have the best papers, in extended version, selected for possible publication in a reputable journal as special issue. Detailed information will soon be announced and will be made available on the conference website.
If you have any questions about paper submission or the Workshop, please contact the Workshop's organizers.
Paper Submissions: ------------------------------------------- 25 September 2020
Acceptance Notification: -------------------------------------- 09 October 2020
Camera Ready Papers and Registration Due by: ----------- 16 October 2020
Conference Dates: --------------------------------------------- 25 - 29 January 2021
International Program Committee*:
All submitted papers will be rigorously reviewed by the Workshop's technical program committee members following similar criteria used in HPCS 2020 and will be published as part of the HPCS 2020 Proceedings.
(* Committee formation is pending and will be finalized shortly.)
For information or questions about Conference's paper submission, tutorials, posters, workshops, special sessions, exhibits, demos, panels and forums organization, doctoral colloquium, and any other information about the conference location, registration, paper formatting, etc., please consult the Conference’s web site at URL: http://hpcs2020.cisedu.info/ or http://conf.cisedu.info/rp/hpcs20 or contact one of the Conference's organizers.
SCOPE AND OBJECTIVES
High performance computing systems intersect with the computer security world in primarily two ways. The first one is as multi-user systems where guarantees beyond availability of the service must be provided to their users (e.g., confidentiality of the data being processed by different actors, integrity of the results and the computation itself). The second one is as potential tools to assess the cost effectiveness of extensively equipped attackers. SHPCS welcomes contributions on both these research directions.
Concerning the first point, SHPCS addresses security aspects related to targeting HPC, grid, and cloud environments, such as security threat awareness, proactive network traffic analysis, network and host intrusion prevention systems, incident response, forensic analysis, and resolution of security incidents. Furthermore, SHPCS considers how to add security properties to high performance computing systems and how they can be formally verified both at design-time (formal verification) and at run-time (run-time verification). In this case, safety properties can also be jointly addressed, e.g., considering availability and fault tolerance for high performance computing systems.
Concerning the second security-HPC interaction, SHPCS covers how to use HPC systems to solve security problems. For instance, an HPC system can be employed to assess the concrete resistance of a given cryptosystem against known cryptanalytic attacks, whenever performing a significant precomputation may increase the feasibility of known attacks. Moreover, SHPCS investigates the tradeoffs between maintaining high performance and achieving security in computing systems and solutions to balance the two objectives. In particular, challenging scenarios arise due to the nature of academic and industrial research HPC centers, where actors with different access rights share the same resources. Indeed, different levels of disclosure of the results, ranging from open science to industrial intellectual property may be needed for the outcomes of computations conducted on the same cluster.
The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of security related to HPC environments, as well as case studies and implementation experiences. Papers should have practical relevance to the construction, evaluation, application, or operation of secure systems.
The SHPCS Workshop topics of interest include (but are not limited to) the following:
Incident response, forensic analysis and resolution of security incidents.
Awareness and quantification of the threats to the security in HPC environments
High-performance security solutions for authentication and data access authorization
Proactive and reactive network traffic analyses
Scalable and usable access control systems
High Performance Secure Storage
Deep Learning Models and Techniques for Security and Privacy Preservation
Cloud HPC security aspects, including use of lightweight containers for security purposes
Accounting and auditing techniques suited for HPC services
Side-channel attacks which can be conducted on HPC systems
Formal verification of security of protocols and tools for HPC systems
High Performance implementation of formal verification tools
High Performance implementation of cryptosystems
High Performance cryptanalysis
Intrusion and Attack Detection and Response
Privacy Preserving and Enhancing Technologies
Data Analytics to Identify Malicious Behaviours on Blockchains
Blockchain schemes for HPC decentralization
High Performance solutions for outsourced data processing
Trustworthy computation solutions to provide reliable results to users (e.g. process Enclaves)
Intelligent Quality Assurance of Smart Contracts
Fraud-Detection based on Blockchain data and Smart Contracts using AI
INSTRUCTIONS FOR PAPER SUBMISSIONS