posted by user: tingyu || 2948 views || tracked by 7 users: [display]

WESS 2014 : Submission Deadline Extended: 9th Workshop on Embedded Systems Security (WESS 2014)


When Oct 17, 2014 - Oct 17, 2014
Where New Delhi
Submission Deadline Jul 20, 2014
Notification Due Aug 25, 2014
Final Version Due Sep 5, 2014
Categories    embedded systems   hardware   security

Call For Papers

9th Workshop on Embedded Systems Security (WESS 2014)
A Workshop of the Embedded Systems Week (ESWEEK 2014)
October 17, 2014
New Delhi, India

About WESS
Embedded computing systems are continuously adopted in a wide range of application areas and
importantly, they are responsible for a large number of safety-critical systems as well as
for the management of critical information. The advent of Internet-enabled embedded systems
introduces a large number of security issues: the Internet can be used to attack embedded
systems and embedded systems can be used to attack the Internet. Furthermore, embedded
systems are vulnerable to many attacks not relevant to servers because they are physically
accessible. Inadvertent threats due to bugs, improper system use, etc. can also have effects
that are indistinguishable from malicious attacks.

This workshop will address the range of problems related to embedded system security.
Of particular interest are security topics that are unique to embedded systems.
The workshop will provide proceedings to the participants and will encourage discussion
and debate about embedded systems security.

Topics of Interest
- Trust models for secure embedded hardware and software
- Isolation techniques for secure embedded hardware, hyperware and software
- System architectures for secure embedded systems
- Metrics for secure design of embedded hardware and software
- Security concerns for medical and other applications of embedded systems
- Support for intellectual property protection and anti-counterfeiting
- Specialized components for authentication, key storage and key generation
- Support for secure debugging and troubleshooting
- Implementation attacks and countermeasures
- Design tools for secure embedded hardware and software
- Hardware/software co-design for secure embedded systems
- Specialized hardware support for security protocols
- Efficient and secure implementation of cryptographic primitives

Submission Instructions
The proceedings of the workshop will be published by the ACM. Papers must be submitted
in PDF form through the EASYCHAIR system. Submitted papers should present original
research that is unpublished and not submitted elsewhere. Papers should be no more
than 10 pages 2-column in ACM format. Templates for the submission of papers can be
found at the ACM website. To submit a paper refer to

Important Dates
Paper submission deadline: July 20, 2014 (extended)
Author notification: August 25 2014
Camera ready papers due: September 5, 2014
Copyright forms due: September 8, 2014
Workshop date: October 17, 2014

Program Chairs
Ting Yu (Qatar Computing Research Institute)
Shengqi Yang (Syltechi)

Program Committee
Divya Arora (Intel)
Andrey Bogdanov (TU. of Denmark)
Bogdan Carbunar (Florida Int. U.)
Kurt Dietrich (NXP Semiconductors)
Reouven Elbaz (Intel)
Domenic J. Forte (U. Conn)
Johann Groszschaedl (U. Luxembourg)
Axel Poschmann (Nanyang Tech. U.)
Erkay Savas (Sabanci U.)
Patrick Schaumont (Virginia Tech)
Peter Schwabe (U. Nijmegen)
Nicolas Sklavos (TEI Western Greece)
Roberto Uribeetxeberria(Mondragon U.)
Yi Wang (National U. Singapore)
Thomas Eisenbarth (WPI)
Yunsi Fei (NorthEastern U)
Marten Van Dijk (U. Conn)
Srini Devadas (MIT)

Steering Committee
Catherine Gebotys (U. Waterloo)
Dimitrios Serpanos (Qatar Computing Research Institute)
Marilyn Wolf (Georgia Tech)

Related Resources

MWAIS 2018   13th Annual Conference of the Midwest Association for Information Systems
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
IEEE - ICISE - Ei 2018   2018 3rd International Conference on Information Systems Engineering (ICISE 2018)--IEEE Xplore, Ei Compendex
IJSC 2017   International Journal on Soft Computing
GeoRich 2017   GeoRich 2017 : GeoRich@SIGMOD/PODS 2017: Submission Deadline Extended to March 5 - CORRECT DATES
IJCCSA 2017   International Journal on Cloud Computing: Services and Architecture
GeoRich 2017   GeoRich@SIGMOD/PODS 2017: Submission Deadline Extended to March 5
IJCIS 2017   International Journal on Cryptography and Information Security
XDOM0 2017   [Extended submission deadline: March 7] First International Workshop on Security and Dependability of Multi-Domain Infrastructures
Living Machines 2017   [LM2017] Second Call for Papers, Satellite Events and Sponsors (7 weeks until submission deadline)