2nd Workshop on Embedded Systems Security
Embedded computing systems are continuously adopted in a wide range of application areas and importantly, they are responsible for a large number of safety-critical systems as well as for the management of critical information. The advent of Internet-enabled embedded systems introduces a large number of security issues: the Internet can be used to attack embedded systems and embedded systems can be used to attack the Internet. Furthermore, embedded systems are vulnerable to many attacks not relevant to servers because they are physically accessible. Inadvertent threats due to bugs, improper system use, etc. can also have effects that are indistinguishable from malicious attacks.
This workshop will address the range of problems related to embedded
system security. Of particular interest are security topics that are unique
to embedded systems. The workshop will provide proceedings to the participants
and will encourage discussion and debate about embedded systems security.
Topics of Interest
Topics of interest include but are not limited to:
|Sri Parameswaran||University of New South Wales||Australia||(Co-chair)|
|Tilman Wolf||University of Massachusetts||USA||(Co-chair)|
|Young Ik Eom||Sungkyunkwan University||Korea|
|Jinwoo Kim||John Jay College of Criminal Justice||USA|
|Phil Koopman||Carnegie Mellon University||USA|
|David Lie||University of Toronto||Canada|
|Christof Paar||Bochum University||Germany|
|Srivaths Ravi||Texas Instruments||India|
|Sean Smith||Dartmouth College||USA|
|Ingrid Verbauwhede||K.U. Leuven||Belgium|
|Wayne Wolf||Princeton University||USA||(Chair)|
|Catherine Gebotys||University of Waterloo||Canada|
|Dimitrios Serpanos||University of Patras||Greece|
Message from the Program Committee Chairs
The Workshopon Embedded Systems Security is in it's second year and we are delighted with the interesting technical program that promises an exciting event. As program chairs, we managed the review process of all papers over the last few months. For this year’s workshop, we have had a number of paper submissions and the selection process was competitive. Each submitted paper received three reviews by members of the Technical Program Committee. We were able to accept 12 papers for presentation and inclusion in the work shop proceedings.
We would like to thank a number of people who assisted us during the process and who helped make this workshop a success. First and foremost, we would like to thank all the authors who submitted their papers. Their contributions make this workshop an important event in the field of embedded systems security. We would also like to thank the members of the Technical Program Committee who dedicated their time to the reviewing of papers and provided authors with valuable feedback. Finally, we would like the members of the Workshop Steering Committee, in particular Dimitrios Serpanos, who have guided us through the process of organizing this workshop.
We look forward to a productive workshop and trust that all presenters and attendees will find this event valuable for their research. We hope that the Workshop on Embedded Systems Security community continues to grow over the coming years and that our contributions help to solve the key problems in this exciting field of research.
Tilman Wolf and Sri Parameswaran