| |||||||||||||||
WESS 2009 : 4th Workshop on Embedded Systems Security | |||||||||||||||
Link: http://www.wess-workshop.org | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Embedded computing systems are widely adopted in application areas ranging
from safety-critical systems to vital information management. The inherent characteristics of embedded systems and the advent of Internet-enabled devices introduce a large number of security issues. Embedded systems are vulnerable to remote intrusion, power and timing attacks, hijacking, etc. These vulnerabilities are different from traditional workstation security issues due to the physical properties, applications, and performance limitations of embedded systems. This workshop provides a forum for researchers to present novel ideas on addressing security issues that arise in embedded systems. Of particular interest are security topics that are unique to embedded systems. Such topics include but are not limited to the following: * Security planning and provisioning for embedded systems. * Security of Internet-enabled embedded systems. * Power-related attacks and countermeasures. * Timing-related attacks and countermeasures. * Novel attacks and countermeasures. * Security of sensor networks both wired and wireless. * Security engineering. * Case studies. The proceedings of the workshop will be published by the ACM. Paper must be submitted in PDF form through the EDAS system. Submitted papers should present original research that is unpublished and not submitted elsewhere. Papers should be no more than 10 pages 2-column in ACM format. Templates for the submission of papers can be found at the ACM website: http://www.acm.org/sigs/publications/proceedings-templates The copyright form is available at the following website: http://www.acm.org/publications/CopyReleaseProcFinal-6.2.09.pdf |
|