WESS 2013 - 8th Workshop on Embedded Systems Security
Topics/Call fo Papers
Embedded computing systems are continuously adopted in a wide range of application areas and importantly, they are responsible for a large number of safety-critical systems as well as for the management of critical information. The advent of Internet-enabled embedded systems introduces a large number of security issues: the Internet can be used to attack embedded systems and embedded systems can be used to attack the Internet. Furthermore, embedded systems are vulnerable to many attacks not relevant to servers because they are physically accessible. Inadvertent threats due to bugs, improper system use, etc. can also have effects that are indistinguishable from malicious attacks.
This workshop will address the range of problems related to embedded system security. Of particular interest are security topics that are unique to embedded systems. The workshop will provide proceedings to the participants and will encourage discussion and debate about embedded systems security.
Topics of Interest
Trust models for secure embedded hardware and software
Isolation techniques for secure embedded hardware, hyperware, and software
System architectures for secure embedded systems
Metrics for secure design of embedded hardware and software
Security concerns for medical and other applications of embedded systems
Support for intellectual property protection and anti-counterfeiting
Specialized components for authentication, key storage and key generation
Support for secure debugging and troubleshooting
Implementation attacks and countermeasures
Design tools for secure embedded hardware and software
Hardware/software codesign for secure embedded systems
Specialized hardware support for security protocols
This workshop will address the range of problems related to embedded system security. Of particular interest are security topics that are unique to embedded systems. The workshop will provide proceedings to the participants and will encourage discussion and debate about embedded systems security.
Topics of Interest
Trust models for secure embedded hardware and software
Isolation techniques for secure embedded hardware, hyperware, and software
System architectures for secure embedded systems
Metrics for secure design of embedded hardware and software
Security concerns for medical and other applications of embedded systems
Support for intellectual property protection and anti-counterfeiting
Specialized components for authentication, key storage and key generation
Support for secure debugging and troubleshooting
Implementation attacks and countermeasures
Design tools for secure embedded hardware and software
Hardware/software codesign for secure embedded systems
Specialized hardware support for security protocols
Other CFPs
- 9th International Conference on High-Performance and Embedded Architectures and Compilers
- 19th International Conference on Intelligent User Interfaces (IUI'2014)
- 16th International Conference on Human-Computer Interaction with Mobile Devices and Services
- The 2014 ACM Conference on Ubiquitous Computing
- 16th ACM International Conference on Multimodal Interaction
Last modified: 2013-05-17 22:20:30