Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors

    Receive Latest News

    Feedburner
    Share Us


    WESS 2012 - 7th Workshop on Embedded Systems Security (WESS 2012)

    View: 448

    Website | Want to Edit it Edit Freely

    Category WESS 2012

    Deadline: July 06, 2012 | Date: October 12, 2012

    Venue/Country: Tampere, Finland

    Updated: 2012-06-23 14:26:24 (GMT+9)

    Call For Papers - CFP

    Embedded computing systems are continuously adopted in a wide range of application areas and

    importantly, they are responsible for a large number of safety-critical systems as well as for the

    management of critical information. The advent of Internet-enabled embedded systems introduces a

    large number of security issues: the Internet can be used to attack embedded systems and

    embedded systems can be used to attack the Internet. Furthermore, embedded systems are

    vulnerable to many attacks not relevant to servers because they are physically accessible.

    Inadvertent threats due to bugs, improper system use, etc. can also have effects that are

    indistinguishable from malicious attacks.

    This workshop will address the range of problems related to embedded system security. Of particular

    interest are security topics that are unique to embedded systems. The workshop will provide

    proceedings to the participants and will encourage discussion and debate about embedded systems

    security.

    Topics of Interest

    - Trust models for secure embedded hardware and software

    - Isolation techniques for secure embedded hardware, hyperware and software

    - System architectures for secure embedded systems

    - Metrics for secure design of embedded hardware and software

    - Security concerns for medical and other applications of embedded systems

    - Support for intellectual property protection and anti-counterfeiting

    - Specialized components for authentication, key storage and key generation

    - Support for secure debugging and troubleshooting

    - Implementation attacks and countermeasures

    - Design tools for secure embedded hardware and software

    - Hardware/software co-design for secure embedded systems

    - Specialized hardware support for security protocols

    Submission Instructions

    The proceedings of the workshop will be published by the ACM. Papers must be submitted in PDF

    form through the EDAS system. Submitted papers should present original research that is

    unpublished and not submitted elsewhere. Papers should be no more than 10 pages 2-column in

    ACM format. Templates for the submission of papers can be found at the ACM website. To submit a

    paper refer to http://www.wess-workshop.org

    Important Dates

    Abstract registration deadline: July 6, 2012

    Paper submission deadline: July 13, 2012

    Author notification: August 10, 2012

    Copyright forms due: August 31, 2012

    Camera ready papers due: August 31, 2012.


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.