{"id":303,"date":"2022-01-25T17:51:46","date_gmt":"2022-01-25T17:51:46","guid":{"rendered":"https:\/\/mcsoc-forum.org\/site\/?page_id=303"},"modified":"2026-02-18T02:40:55","modified_gmt":"2026-02-18T02:40:55","slug":"track-security","status":"publish","type":"page","link":"https:\/\/mcsoc-forum.org\/site\/index.php\/track-security\/","title":{"rendered":"Testing, Security, and Trust in Embedded Multicore\/Manycore Systems"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-1 wp-block-columns-is-layout-flex\"><\/div>\n\n\n\n<div class=\"wp-block-group has-border-color has-medium-gray-border-color has-white-background-color has-background\" style=\"border-width:1px;border-radius:12px;padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\">\n\n<h2 class=\"wp-block-heading has-text-color\" style=\"color:#00629b;text-transform:uppercase;letter-spacing:1px\">Track Chair<\/h2>\n<hr class=\"wp-block-separator has-text-color has-black-color has-alpha-channel-opacity has-black-background-color has-background is-style-wide\"\/>\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"margin-top:20px;margin-bottom:20px;grid-template-columns:15% auto\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"http:\/\/mcsoc-forum.org\/site\/wp-content\/uploads\/2026\/02\/WeidongCao.png\" alt=\"TBC\" class=\"wp-image-7702 size-full\"\/><\/figure><div class=\"wp-block-media-text__content\"><p class=\"has-large-font-size\"><strong><a href=\"#\" style=\"text-decoration: none; color: #00629B;\">Weidong Cao<\/a><\/strong><br><span style=\"font-size: 0.9em; color: #555;\">The George Washington University, USA<\/span><\/p>\n<\/div><\/div>\n<\/div>\n\n\n\n<p>The exponential increase in complexity and integration density of embedded multicore and manycore systems has created unprecedented challenges in ensuring their dependability. As these systems are increasingly deployed in safety-critical domains\u2014such as automotive, aerospace, and medical infrastructure\u2014the cost of failure or security breaches becomes unacceptable. This track addresses the intersection of reliability, security, and hardware trust. It explores innovative methodologies to detect manufacturing defects in nanometer-scale technologies, protect shared resources from side-channel attacks, and ensure long-term reliability against aging and soft errors. We invite researchers to submit contributions that advance the state-of-the-art in design-for-testability (DfT), hardware security primitives, and resilient system architectures.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Topics of Interest<\/h3>\n\n\n\n<p>We welcome submissions related, but not limited, to the following areas:<\/p>\n\n\n\n<p><strong>Advanced Testing &amp; Design for Testability (DfT)<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Automatic Test Pattern Generation (ATPG) &amp; Test Compression<\/li>\n\n\n\n<li>Design for Testability (DfT) for SoC, NoC, ASIC, and 3D-ICs<\/li>\n\n\n\n<li>Built-In Self-Test (BIST) and Online\/In-Field Testing<\/li>\n\n\n\n<li>Memory Test, Diagnosis, and Repair (BISR)<\/li>\n\n\n\n<li>Testing for Analog, Mixed-Signal, and RF Circuits<\/li>\n\n\n\n<li>Delay Fault Modeling, Diagnosis, and Failure Analysis<\/li>\n<\/ul>\n\n\n\n<p><strong>Hardware Security &amp; Trust<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Design for Security and Hardware Trustworthiness<\/li>\n\n\n\n<li>Detection of Hardware Trojans and Counterfeit ICs<\/li>\n\n\n\n<li>Side-Channel Attacks and Countermeasures<\/li>\n\n\n\n<li>Secure Boot, Physical Unclonable Functions (PUFs), and TRNGs<\/li>\n\n\n\n<li>Cyberattack Defense in Embedded Hardware<\/li>\n\n\n\n<li>Security Verification and Validation<\/li>\n<\/ul>\n\n\n\n<p><strong>Reliability, Safety &amp; Fault Tolerance<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Reliability Awareness, Prediction, and Aging Modeling<\/li>\n\n\n\n<li>Fault Tolerance, Error Detection, Correction, and Recovery (EDAC)<\/li>\n\n\n\n<li>Self-Repair, Restructuring, and Reconfiguration Mechanisms<\/li>\n\n\n\n<li>Functional Safety and ISO 26262 Compliance for Automotive ICs<\/li>\n\n\n\n<li>Soft Error Analysis and Radiation Hardening<\/li>\n<\/ul>\n\n\n\n<p><strong>Emerging Domains &amp; Adaptive Systems<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Testing and Reliability of Machine Learning (ML) Accelerators<\/li>\n\n\n\n<li>Adaptive Embedded Hardware Architectures and Design<\/li>\n\n\n\n<li>Test Synthesis and Fault Simulation for Adaptive Systems<\/li>\n\n\n\n<li>Security and Trust in FPGA-based and Reconfigurable Systems<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Former Chairs<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><a href=\"https:\/\/myweb.cuhk.edu.cn\/zhengyue\">Zheng Yue<\/a><\/strong>, The Chinese University of Hong Kong, Shenzhen, China (MCSoC 2025)<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/www.itiv.kit.edu\/english\/21_3015.php\">Tanja Harbaum<\/a><\/strong>, Karlsruhe Institute of Technology (KIT), Germany<em> <\/em>(17th IEEE MCSoC 2024)<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/www.ee.nchu.edu.tw\/en_teacher02.asp?url=32&amp;cno=5&amp;tno=26\">Yeong-Kang Lai<\/a>,<\/strong> NCHU, Taiwan (16th IEEE MCSoC 2023)<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Track Chair Weidong CaoThe George Washington University, USA The exponential increase in complexity and integration density of embedded multicore and manycore systems has created unprecedented challenges in ensuring their dependability. As these systems are increasingly deployed in safety-critical domains\u2014such as automotive, aerospace, and medical infrastructure\u2014the cost of failure or security breaches becomes unacceptable. This track &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/mcsoc-forum.org\/site\/index.php\/track-security\/\">Continue reading<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-303","page","type-page","status-publish","hentry","nodate","item-wrap"],"_links":{"self":[{"href":"https:\/\/mcsoc-forum.org\/site\/index.php\/wp-json\/wp\/v2\/pages\/303","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mcsoc-forum.org\/site\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/mcsoc-forum.org\/site\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/mcsoc-forum.org\/site\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mcsoc-forum.org\/site\/index.php\/wp-json\/wp\/v2\/comments?post=303"}],"version-history":[{"count":47,"href":"https:\/\/mcsoc-forum.org\/site\/index.php\/wp-json\/wp\/v2\/pages\/303\/revisions"}],"predecessor-version":[{"id":11547,"href":"https:\/\/mcsoc-forum.org\/site\/index.php\/wp-json\/wp\/v2\/pages\/303\/revisions\/11547"}],"wp:attachment":[{"href":"https:\/\/mcsoc-forum.org\/site\/index.php\/wp-json\/wp\/v2\/media?parent=303"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}