posted by user: captainpatate || 3957 views || tracked by 9 users: [display]

WESS 2009 : 4th Workshop on Embedded Systems Security

FacebookTwitterLinkedInGoogle

Link: http://www.wess-workshop.org
 
When Oct 15, 2009 - Oct 15, 2009
Where Grenoble, France
Submission Deadline Aug 10, 2009
Notification Due Sep 9, 2009
Final Version Due Sep 13, 2009
Categories    embedded   security
 

Call For Papers

Embedded computing systems are widely adopted in application areas ranging
from safety-critical systems to vital information management. The inherent
characteristics of embedded systems and the advent of Internet-enabled
devices introduce a large number of security issues. Embedded systems are
vulnerable to remote intrusion, power and timing attacks, hijacking, etc.
These vulnerabilities are different from traditional workstation security
issues due to the physical properties, applications, and performance
limitations of embedded systems.

This workshop provides a forum for researchers to present novel ideas on
addressing security issues that arise in embedded systems. Of particular
interest are security topics that are unique to embedded systems. Such
topics include but are not limited to the following:

* Security planning and provisioning for embedded systems.
* Security of Internet-enabled embedded systems.
* Power-related attacks and countermeasures.
* Timing-related attacks and countermeasures.
* Novel attacks and countermeasures.
* Security of sensor networks both wired and wireless.
* Security engineering.
* Case studies.


The proceedings of the workshop will be published by the ACM.

Paper must be submitted in PDF form through the EDAS system. Submitted papers
should present original research that is unpublished and not submitted
elsewhere. Papers should be no more than 10 pages 2-column in ACM format.
Templates for the submission of papers can be found at the ACM website:
http://www.acm.org/sigs/publications/proceedings-templates
The copyright form is available at the following website:
http://www.acm.org/publications/CopyReleaseProcFinal-6.2.09.pdf

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
ICAIBD 2026   IEEE--2026 The 9th International Conference on Artificial Intelligence and Big Data (ICAIBD 2026)
IJGCA 2025   International Journal of Grid Computing & Applications
CSSE 2025   3rd International Conference on Computer Science and Software Engineering
IEEE ICITES 2025   IEEE--2025 5th International Conference on Intelligent Technology and Embedded Systems (ICITES 2025)
LLM4Sec 2025   Workshop on the use of Large Language Models for Cybersecurity
ICITA 2026   ICITA 2026: 20th International Conference on Information Technology and Applications
IEEE-DSIS 2025   2025 International Conference on Data Science and Intelligent Systems (DSIS 2025)
IJMA 2025   International Journal of Multimedia & Its Applications -- ERA, WJCI Indexed, H index - 22