posted by user: testest || 3991 views || tracked by 3 users: [display]

WESS 2013 : 8th Workshop on Embedded Systems Security

FacebookTwitterLinkedInGoogle

Link: http://www.wess-workshop.org/
 
When Sep 29, 2013 - Sep 29, 2013
Where Montreal, Canada
Submission Deadline Jul 8, 2013
Notification Due Aug 12, 2013
Final Version Due Aug 26, 2013
Categories    security   embedded system
 

Call For Papers

***********************************************************
8th Workshop on Embedded Systems Security (WESS 2013)
A Workshop of ESWEEK 2013

September 29, 2013
Montreal, Canada
http://www.wess-workshop.org/

Submission Deadline : *July 8, 2013*
***********************************************************

*ABOUT WESS 2013*
Embedded computing systems are continuously adopted in a wide range of application areas and importantly, they are responsible for a large number of safety-critical systems as well as for the management of critical information. The advent of Internet-enabled embedded systems introduces a large number of security issues: the Internet can be used to attack embedded systems and embedded systems can be used to attack the Internet. Furthermore, embedded systems are vulnerable to many attacks not relevant to servers because they are physically accessible. Inadvertent threats due to bugs, improper system use, etc. can also have effects that are indistinguishable from malicious attacks.

This workshop will address the range of problems related to embedded system security. Of particular interest are security topics that are unique to embedded systems. The workshop will provide proceedings to the participants and will encourage discussion and debate about embedded systems security.

*IMPORTANT DATES*
Paper submission deadline: July 8, 2013 (updated)
Author notification: August 12 2013
Copyright forms due: September 2, 2013
Camera ready papers due: August 26, 2013
Workshop date: September 29, 2013

*TOPICS OF INTEREST*
• Trust models for secure embedded hardware and software
• Isolation techniques for secure embedded hardware, hyperware and software
• System architectures for secure embedded systems
• Metrics for secure design of embedded hardware and software
• Security concerns for medical and other applications of embedded systems
• Support for intellectual property protection and anti-counterfeiting
• Specialized components for authentication, key storage and key generation
• Support for secure debugging and troubleshooting
• Implementation attacks and countermeasures
• Design tools for secure embedded hardware and software
• Hardware/software co-design for secure embedded systems
• Specialized hardware support for security protocols
• Efficient and secure implementation of cryptographic primitives

*SUBMISSION INSTRUCTIONS*
The proceedings of the workshop will be published by the ACM. Papers must be submitted in PDF form through the EDAS system. Submitted papers should present original research that is unpublished and not submitted elsewhere. Papers should be no more than 10 pages 2-column in ACM format. Templates for the submission of papers can be found at the ACM website. To submit a paper refer to http://www.wess-workshop.org


Related Resources

EMERGING 2025   The Seventeenth International Conference on Emerging Networks and Systems Intelligence
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CYBER 2025   The Tenth International Conference on Cyber-Technologies and Cyber-Systems
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
ICAUAS 2025   2025 International Conference on Advanced Unmanned Aerial Systems (ICAUAS 2025)
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
ISCSIC 2025   2025 9th International Symposium on Computer Science and Intelligent Control(ISCSIC 2025)
IJCSITY 2024   International Journal of Computational Science and Information Technology