ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

SEMS 2017 - Workshop on Security for Embedded and Mobile Systems (SEMS)

Date2017-04-30

Deadline2016-12-15

VenueParis, France France

Keywords

Websitehttp://sems2017.cs.ru.nl

Topics/Call fo Papers

Embedded and mobile devices that provide security and crypto functionalities and manage private and confidential data are omnipresent in our daily lives. Examples of such devices range from smart cards and RFID tags, to mobile phones, tablets, and IoT devices. Ensuring the security and privacy of these devices is a challenging problem, as witnessed by recent breaking of crypto and security systems used in mobile phones, car keys, and RFID-enabled cards. Typical threats to extract the keys include side-channel and fault analysis.
Additionally, the vulnerabilities of the devices imply also privacy concerns. The operating systems supporting some of those devices, particularly mobile phones and tablets, but also IoT ones, have become very complex. Various sorts of malware present a constant threat for users. Although measures like application sandboxing take place, they also open the court for new attacks by constantly collecting and organizing sensitive information about the user.
The workshop seeks submissions from academia and industry presenting novel research results on the following topics of interest:
Security architectures for embedded and mobile systems
Physical (side-channel and fault) attacks on embedded and mobile systems
Hardware security of mobile devices
(mobile) Malware detection and prevention
Machine learning applications to highlight possible threats to user privacy
Privacy-preserving issues for mobile devices
Secure localization and location privacy for mobile devices
Security and privacy in the Internet of Things
Secure execution environments (e.g., TrustZone, TPMs) on mobile devices
Sensor spoofing attacks
We especially encourage novel ideas exploiting architecture-specific or novel “out of the box” attacks combining ideas from different communities, e.g., malware detection or privacy violation using side-channels.

Last modified: 2016-11-23 22:07:36