Abbrevation
WESS
City
New Delhi
Country
India
Deadline Paper
Start Date
End Date
Abstract

Embedded computing systems are continuously adopted in a wide range of application areas and<br>importantly, they are responsible for a large number of safety&#8211;critical systems as well as<br>for the management of critical information&#046; The advent of Internet&#8211;enabled embedded systems<br>introduces a large number of security issues: the Internet can be used to attack embedded<br>systems and embedded systems can be used to attack the Internet&#046; Furthermore, embedded<br>systems are vulnerable to many attacks not relevant to servers because they are physically<br>accessible&#046; Inadvertent threats due to bugs, improper system use, etc&#046; can also have effects<br>that are indistinguishable from malicious attacks&#046;<br>This workshop will address the range of problems related to embedded system security&#046;<br>Of particular interest are security topics that are unique to embedded systems&#046;<br>The workshop will provide proceedings to the participants and will encourage discussion<br>and debate about embedded systems security&#046;<br>Topics of Interest<br>&#8211; Trust models for secure embedded hardware and software<br>&#8211; Isolation techniques for secure embedded hardware, hyperware and software<br>&#8211; System architectures for secure embedded systems<br>&#8211; Metrics for secure design of embedded hardware and software<br>&#8211; Security concerns for medical and other applications of embedded systems<br>&#8211; Support for intellectual property protection and anti&#8211;counterfeiting<br>&#8211; Specialized components for authentication, key storage and key generation<br>&#8211; Support for secure debugging and troubleshooting<br>&#8211; Implementation attacks and countermeasures<br>&#8211; Design tools for secure embedded hardware and software<br>&#8211; Hardware/software co&#8211;design for secure embedded systems<br>&#8211; Specialized hardware support for security protocols<br>&#8211; Efficient and secure implementation of cryptographic primitives<br>