Call For Papers [PDF] [DOC]
The strong growth in mobile devices, networked embedded systems, wireless sensors, in/inter-vehicular computing applications, the ever increasing information computing power offered by computing clusters and information services over networks (stationary and mobile) presents new challenges, especially with respect to the security of integrated applications and environments. Security solutions need to address cost, resource constraints, enterprise/embedded interconnectivity, real time deadlines, multi-vendor integration issues, potentially unreliable mobile systems with low-bandwidth communication, and physical constraints often found in embedded applications.
We solicit previously unpublished papers offering novel research contributions in these aspects of computer security that focus on network computing, embedded and mobile/ubiquitous systems. Papers may present advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, infrastructure, architectures, algorithms and protocols.
The major areas of interest include, but are not limited to, the following:
- Embedded System and hardware Security/Trust
- Intrusion detection and prevention
- Security for transport systems (cars, rail, aerospace, etc.)
- Security in safety-critical systems
- Methods for Key Management and Access Control
- Robust Secure Protocols and Cryptographic Methods
- Embedded control network authentication and integrity
- Secure embedded device software updates
- Cryptanalysis Methods
- Power/Timing based attacks and mitigation
- Design for security
- Security of Cyberphysical Systems (enterprise+embedded composites)
- License management for disconnected embedded systems
- Tamper resistance
Workshop Committee:
- Chair: Vinodh Gopal, Intel Corporation, USA
- Dr. Michael Kurdziel, Harris Corp, USA
- Dr. Miroslav Velev, Aries Design Automation, USA
- Prof. Ramalingam Sridhar, SUNY-Buffalo, USA
- Prof. Philip Koopman, Carnegie-Mellon University, USA
- Prof. Berk Sunar, Worcester Polytechnic Institute, USA
- Prof. Cetin Kaya Koc, University of California, Santa Barbara, USA
- Dr. Divya Arora, Intel Corporation, USA
- Dr. Nachiketh Potlapally, Intel Corporation, USA
Submission Guidelines:
Please see the submission page for information.
Workshop Program: (pdf version)
- 8:00 am – 9:00 am Breakfast and Registration
- 9:00 am – 9:05 am Opening Remarks by
Vinodh Gopal, Intel Corporation - 9:05 am – 10:25 pm Session 1: (Chair:
Miroslav Velev, Aries Design Automation)
Hardware Mechanism and Performance Evaluation of Hierarchical Page-Based Memory Bus Protection
Lifeng Su (STMicroelectronics), Albert Martinez (STMicroelectronics), Pierre Guillemin (STMicroelectronics), Sebastien Cerdan (Télécom ParisTech), Renaud Pacalet (Télécom ParisTech)
On the Complexity of Probabilistic Key Pre-distribution Schemes
Mahalingam Ramkumar (Mississippi State University)
Hierarchical Concealed Data Aggregation for Wireless Sensor Networks
Suat Ozdemir (Gazi University, Turkey), Yang Xiao (The University of Alabama Tuscaloosa)
Highly-Resilient Services for Critical Infrastructures
Giuliana Santos Veronese (Universidade de Lisboa, Portugal), Miguel Correia (Universidade de Lisboa, Portugal), Alysson Neves Bessani (Universidade de Lisboa, Portugal), Lau Cheuk Lung (Universidade Federal de Santa Catarina – Brazil) - 10:25 am – 10:45 am Coffee Break
- 10:45 am – 11:45 am Keynote: "Message Digests for the Twenty-First Century: An Overview of the NIST SHA-3 Cryptographic Hash Algorithm Competition", Alan Kaminsky (Rochester Institute of Technology)
- 11:45 am – 1:00 pm Lunch Break
- 1:00 pm – 2:00 pm Session 2: (Chair:
Berk Sunar (Worcester Polytechnic Institute)
Fast and Constant-Time Implementation of Modular Exponentiation
Vinodh Gopal, James Guilford, Erdinc Ozturk, Wajdi Feghali, Gil Wolrich, Martin Dixon (Intel Corporation)
SensorEar: A Sensor Network Based Eavesdropping System
Ge Ruan, Soumya Jain and Sencun Zhu (The Pennsylvania State University)
Accelerating Techniques for Rapid Mitigation of Phishing and Spam Emails
Pranil Gupta, Ajay Nagrale and Shambhu Upadhyaya (University at Buffalo)
- 2:00 pm – 2:45 pm Invited Talk: "Embedded Security and Survivability", Phil Koopman, Carnegie Mellon University
- 2:45 pm – 3:15 pm Coffee Break
- 3:15 pm – 4:00 pm Invited Talk: "Challenges and Opportunities in Embedded System Security: A View from the Trenches" Nachiketh Potlapally, Intel Corporation
- 4:00 pm – 4:45 pm Panel Discussion. Panelists: Mike Kurdziel (Harris Corporation), Berk Sunar (Worcester Polytechnic Institute) and Miroslav Velev (Aries Design Automation)
- 4:45 pm Wrap-up