Aims and scope

The journal covers all topics related to electronic hardware and systems security encompassing all application domains, including embedded systems, cyber-physical systems, internet of things (IoT), reconfigurable systems (e.g. FPGA based), and biomedical systems (e.g. implants, wearables). All abstraction levels of hardware –from hardware intellectual property (IP) blocks to microchips to printed circuit boards (PCBs) and systems are within the scope of the journal. The interaction between hardware and firmware/software as it relates to system security and trust is covered by the journal. In particular, the scope of the journal includes, but is not limited to the following topics in the broad area of hardware and systems security:

• Cyber Physical Systems (CPS) security
• Embedded systems security
• Design for Security (DfS) of electronic hardware
• Security analysis and secure design of printed circuit boards (PCBs)
• Security analysis and protection of Internet of Things (IoT)
• Hardware Trojan attacks and detection techniques
• Hardware-based security primitives (PUFs, RNGs, Aging Sensors)
• Side-channel attacks (SCA) of all forms (e.g. power analysis attacks, timing attacks, fault injection attacks, and EM attacks) and at all levels (e.g. processor core, SoC, FPGA, and crypto module)

• Information leakage in computing through side- and covert channels and strategies to minimize it

• Attacks on machine learning or neural network

• Machine learning enabled hardware and system security
• Security, privacy, and trust protocols
• Metrics, policies, and standards related to hardware security
• Security of biomedical systems, e-health, and medicine
• Secure, trustworthy and resilient System on Chip (SoC) architecture
• Hardware IP trust (watermarking, fingerprinting, trust verification)
• Trusted manufacturing including split manufacturing and 3D ICs
• Secure and efficient (low-power, robust, and high-performance) hardware implementation of cryptographic algorithms
• Reverse engineering and hardware obfuscation
• Security of RFID devices
• Security analysis of track and trace technologies for various supply chains including electronics, food, medicine and more
• Supply chain risks mitigation including counterfeit detection & avoidance
• Hardware tampering attacks and protection
• Hardware obfuscation, encryption and metering
• Hardware techniques that ensure software, firmware and system security
• Field Programmable Gate Arrays (FPGA) security and trust
• Test versus security
• Conflict and relationship between Security and Reliability, Security and Energy-efficiency
• Automotive systems security
• Robotics systems security
• Security of nanoscale devices including emerging post-CMOS devices
• Hardware assisted cyber security

Working on a manuscript?

Avoid the most common mistakes and prepare your manuscript for journal editors.

Learn more