posted by user: tingyu || 9070 views || tracked by 14 users: [display]

WESS 2014 : Workshop on Embedded Systems Security

FacebookTwitterLinkedInGoogle

Link: http://www.wess-workshop.org/
 
When Oct 12, 2014 - Oct 12, 2014
Where New Delhi, Inda
Submission Deadline Jul 13, 2014
Notification Due Aug 25, 2014
Final Version Due Sep 5, 2014
Categories    embedded systems   security
 

Call For Papers

9th Workshop on Embedded Systems Security (WESS 2014)
A Workshop of the Embedded Systems Week (ESWEEK 2014)
October 12, 2014 (Tentative)
New Delhi, India
http://www.wess-workshop.org/

About WESS
Embedded computing systems are continuously adopted in a wide range of application areas and
importantly, they are responsible for a large number of safety-critical systems as well as
for the management of critical information. The advent of Internet-enabled embedded systems
introduces a large number of security issues: the Internet can be used to attack embedded
systems and embedded systems can be used to attack the Internet. Furthermore, embedded
systems are vulnerable to many attacks not relevant to servers because they are physically
accessible. Inadvertent threats due to bugs, improper system use, etc. can also have effects
that are indistinguishable from malicious attacks.

This workshop will address the range of problems related to embedded system security.
Of particular interest are security topics that are unique to embedded systems.
The workshop will provide proceedings to the participants and will encourage discussion
and debate about embedded systems security.

Topics of Interest
- Trust models for secure embedded hardware and software
- Isolation techniques for secure embedded hardware, hyperware and software
- System architectures for secure embedded systems
- Metrics for secure design of embedded hardware and software
- Security concerns for medical and other applications of embedded systems
- Support for intellectual property protection and anti-counterfeiting
- Specialized components for authentication, key storage and key generation
- Support for secure debugging and troubleshooting
- Implementation attacks and countermeasures
- Design tools for secure embedded hardware and software
- Hardware/software co-design for secure embedded systems
- Specialized hardware support for security protocols
- Efficient and secure implementation of cryptographic primitives

Submission Instructions
The proceedings of the workshop will be published by the ACM. Papers must be submitted
in PDF form through the EASYCHAIR system. Submitted papers should present original
research that is unpublished and not submitted elsewhere. Papers should be no more
than 10 pages 2-column in ACM format. Templates for the submission of papers can be
found at the ACM website. To submit a paper refer to http://www.wess-workshop.org

Important Dates
Paper submission deadline: July 13, 2014
Author notification: August 25 2014
Camera ready papers due: September 5, 2014
Copyright forms due: September 8, 2014
Workshop date: October 12, 2014 (Tentative)

Program Chairs
Ting Yu (Qatar Computing Research Institute)
Shengqi Yang (Syltechi)


Program Committee (tentative)
Divya Arora (Intel)
Andrey Bogdanov (TU. of Denmark)
Bogdan Carbunar (Motorola Labs)
Kurt Dietrich (NXP Semiconductors)
Reouven Elbaz (Intel)
Domenic J. Forte (U. Conn)
Johann Groszschaedl (U. Luxembourg)
Axel Poschmann (Nanyang Tech. U.)
Erkay Savas (Sabanci U.)
Patrick Schaumont (Virginia Tech)
Peter Schwabe (U. Nijmegen)
Nicolas Sklavos (Technological Educational Institute of Western Greece)
Roberto Uribeetxeberria(Mondragon U.)
Yi Wang (National U. Singapore)
Thomas Eisenbarth (WPI)
Yunsi Fei (NorthEastern U)
Marten Van Dijk (U. Conn)
Srini Devadas (MIT)

Steering Committee
Catherine Gebotys (U. Waterloo)
Dimitrios Serpanos (Qatar Computing Research Institute)
Marilyn Wolf (Georgia Tech)

Related Resources

ICONS 2025   The Twentieth International Conference on Systems
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ICISS 2025   ACM--2025 The 8th International Conference on Information Science and Systems (ICISS 2025)
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
CSEA 2024   10th International Conference on Computer Science, Engineering and Applications
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal