MAL-IoT 2016 - 1st International Workshop on Malicious Software and Hardware in the Internet of Things
Topics/Call fo Papers
Cyber-physical and smart embedded systems, already highly networked, will be even more connected in the near future to form the Internet of Things, handling large amount of private and safety critical data. The pervasive diffusion of these devices will create several threats to privacy and could open new possibilities for attackers, since the security of even large portions of the Internet of Things could be harmed by compromising a reduced number of components. The possibility of securely updating devices should be guaranteed and it should be possible to verify and assert the root of trust of components. With respect to this context we expect contributions in different areas of security in Internet of Things. Topics of the workshop include but are not limit to:
Malicious firmware design and detection
Malware in Internet of Things applications
Hardware root of trust
Privacy issues of smart-home systems and complex systems
Hardware Trojans and their effects on systems
Hardware authentication and IP protection
Secure communication and key-management
Implementation attacks and countermeasures
Emerging threats and attack vectors in the Internet of Things
Supply chain security
Perspective authors are invited to submit novel contributions, work in progresses, and positional papers (4 to 6 pages for regular papers, 2 pages for extended abstracts, double-column ACM SIG alternate style). Submissions must be anonymous with no author names, affiliations, acknowledgments, or obvious references. Computing Frontiers 2016 has obtained the Technical sponsorship of the ACM Association for Computing Machinery. All the papers will be published on the ACM digital library.
Workshop Organizers
Georg T. Becker, Ruhr-University Bochum, Germany, email: Georg.Becker-AT-ruhr-uni-bochum.de
Francesco Regazzoni, ALaRI - USI, Switzerland, email: regazzoni-AT-alari.ch
Malicious firmware design and detection
Malware in Internet of Things applications
Hardware root of trust
Privacy issues of smart-home systems and complex systems
Hardware Trojans and their effects on systems
Hardware authentication and IP protection
Secure communication and key-management
Implementation attacks and countermeasures
Emerging threats and attack vectors in the Internet of Things
Supply chain security
Perspective authors are invited to submit novel contributions, work in progresses, and positional papers (4 to 6 pages for regular papers, 2 pages for extended abstracts, double-column ACM SIG alternate style). Submissions must be anonymous with no author names, affiliations, acknowledgments, or obvious references. Computing Frontiers 2016 has obtained the Technical sponsorship of the ACM Association for Computing Machinery. All the papers will be published on the ACM digital library.
Workshop Organizers
Georg T. Becker, Ruhr-University Bochum, Germany, email: Georg.Becker-AT-ruhr-uni-bochum.de
Francesco Regazzoni, ALaRI - USI, Switzerland, email: regazzoni-AT-alari.ch
Other CFPs
- First International Workshop on Crowd Intelligence for Smart Cities: Technology and Applications
- 4th International Conference on Instrumentation, Control and Automation 2016 (ICA'16)
- IEEE Green Energy and Systems Conference (IGESC 2016)
- International Congress Digital Information Processing, Data Mining, and Wireless Communications (ICDIPDMWC-16)
- International Conference on Networking, Communication and Computing Technology(ICNCCT-16)
Last modified: 2016-01-14 23:08:15