This year's Embedded Security Challenge (ESC) focuses on using emerging technologies to create hardware security primitives. Teams are invited to participate in this challenge and explore the possibilities of using emerging technologies for security.
Download the Call For Participation
The Scenario: You are the head of the emerging technologies department of a company wishing to move away from using classic CMOS-based devices in their circuits. In order to procure funding, you need to submit a proposal to your company board on how these devices can be used as security primitives; however, the constraint is that you may only choose ONE non-CMOS device. Examples of security primitives include, but are not limited to, cryptographically-secure pseudorandom number generators, public key/private key cryptography, one-way hash functions, physically unclonable functions (PUFs), etc.
Some emerging technologies you might consider (this list is not all inclusive): graphene transistors, atomic switches, memristors, Mott field effect transistor (MOTTFET) , spin FET, all-spin logic, spin wave devices, orthogonal spin-transfer random access memory (OST-RAM), magnetoresistive random access memory (MRAM), spintronic devices, nanomagnet logic, phase-change memory (PCM), etc.
To know more about ESC in general, click here.
To access previous years' ESC competition, reports and codes, click here.
There are two phases to this year's challenge: qualification and evaluation of security primitives.
Qualification Phase: Submit a proposal
The 2-page proposal should contain:
Evaluation of security primitives Phase:
Evaluate the security primitives for your chosen technology as outlined in the proposal document. Write up a report detailing your approach and results. This report should contain research material that is sufficient enough to get published in a top conference.
You are required to submit proposal by Oct. 31, 2014 (11:59PM EST).
The score will be determined by Writing Quality, Evaluation Plan, Threat Model and Novelty of the proposal.
Please refer the scroing rubric.