Abbrevation
WESS
City
Amsterdam
Country
Netherlands
Deadline Paper
Start Date
End Date
Abstract

<p style="margin&#8211;bottom: 0cm"><br></p> <p><font color="#14407a"><font size="2"><font style="font&#8211;size: 8pt" size="1">Embedded computing systems are continuously adopted in a wide range of application areas and importantly, they are responsible for a large number of safety&#8211;critical systems as well as for the management of critical information&#046; The advent of the Internet&#8211;of&#8211;Things introduces a large number of security issues: the Internet can be used to attack embedded systems and embedded systems can be used to attack the Internet&#046; Furthermore, embedded systems are vulnerable to many attacks not relevant to servers because they are physically accessible&#046; Inadvertent threats due to bugs, improper system use, etc&#046; can also have effects that are indistinguishable from malicious attacks&#046;</font></font></font></p> <p>This workshop will address the range of problems related to embedded system security&#046; Of particular interest are security topics that are unique to embedded systems&#046; The workshop will provide proceedings to the participants and will encourage discussion and debate about embedded systems security&#046;</p> <h1 class="western">Topics of Interest</h1> <ul><p style="margin&#8211;bottom: 0cm">Trust models for secure embedded hardware and software </p><p style="margin&#8211;bottom: 0cm">Isolation techniques for secure embedded hardware, hyperware, and software </p><p style="margin&#8211;bottom: 0cm">System architectures for secure embedded systems </p><p style="margin&#8211;bottom: 0cm">Hardware security </p><p style="margin&#8211;bottom: 0cm">Metrics for secure design of embedded hardware and software </p><p style="margin&#8211;bottom: 0cm">Security concerns for medical and other applications of embedded systems </p><p style="margin&#8211;bottom: 0cm">Support for intellectual property protection and anti&#8211;counterfeiting </p><p style="margin&#8211;bottom: 0cm">Specialized components for authentication, key storage and key generation </p><p style="margin&#8211;bottom: 0cm">Support for secure debugging and troubleshooting </p><p style="margin&#8211;bottom: 0cm">Implementation attacks and countermeasures </p><p style="margin&#8211;bottom: 0cm">Design tools for secure embedded hardware and software </p><p style="margin&#8211;bottom: 0cm">Hardware/software co&#8211;design for secure embedded systems </p><p style="margin&#8211;bottom: 0cm">Specialized hardware support for security protocols </p><p>Efficient and secure implementation of cryptographic primitives </p></ul> <p style="margin&#8211;bottom: 0cm"><br></p><br>