Embedded Security Challenge - 2014


This year's Embedded Security Challenge (ESC) focuses on using emerging technologies to create hardware security primitives. Teams are invited to participate in this challenge and explore the possibilities of using emerging technologies for security.

Download the Call For Participation

The Scenario: You are the head of the emerging technologies department of a company wishing to move away from using classic CMOS-based devices in their circuits. In order to procure funding, you need to submit a proposal to your company board on how these devices can be used as security primitives; however, the constraint is that you may only choose ONE non-CMOS device. Examples of security primitives include, but are not limited to, cryptographically-secure pseudorandom number generators, public key/private key cryptography, one-way hash functions, physically unclonable functions (PUFs), etc.

Some emerging technologies you might consider (this list is not all inclusive): graphene transistors, atomic switches, memristors, Mott field effect transistor (MOTTFET) , spin FET, all-spin logic, spin wave devices, orthogonal spin-transfer random access memory (OST-RAM), magnetoresistive random access memory (MRAM), spintronic devices, nanomagnet logic, phase-change memory (PCM), etc.

To know more about ESC in general, click here.

To access previous years' ESC competition, reports and codes, click here.

Challenge Phases

There are two phases to this year's challenge: qualification and evaluation of security primitives.

Qualification Phase: Submit a proposal

The 2-page proposal should contain:

  • a brief description of the chosen emerging technology
  • structure and operation of the security primitives
  • threat model for the security primitives
  • security metrics to evaluate the security primitives
  • applications of the security primitives
Be specific. The 10 most promising proposals will be selected as finalists. Reports should be submitted by September 13, 2014. Make sure your team is registered. Email your reports to csaw-esc AT isis DOT poly DOT edu

Evaluation of security primitives Phase:

Evaluate the security primitives for your chosen technology as outlined in the proposal document. Write up a report detailing your approach and results. This report should contain research material that is sufficient enough to get published in a top conference.

Submission Requirements

You are required to submit proposal by Oct. 31, 2014 (11:59PM EST).

Phase 1 Scoring

The score will be determined by Writing Quality, Evaluation Plan, Threat Model and Novelty of the proposal.

Phase 2 Scoring

Please refer the scroing rubric.