Proceedings of the 6th International Workshop on Trustworthy Embedded Devices

Mathias Payer, S. Mangard, E. Weippl, S. Katzenbeisser, Xinxin Fan, T. Güneysu
{"title":"Proceedings of the 6th International Workshop on Trustworthy Embedded Devices","authors":"Mathias Payer, S. Mangard, E. Weippl, S. Katzenbeisser, Xinxin Fan, T. Güneysu","doi":"10.1145/2995289","DOIUrl":null,"url":null,"abstract":"The 6th International Workshop on Trustworthy Embedded Devices (TrustED 2016) was held October 28th, 2016 in Hofburg Palace, Vienna, Austria, and has been co-located with the 23rd ACM Conference on Computer and Communications Security (CCS 2016). TrustED 2016 is a continuation of previous workshops in this series, which were held in conjunction with ESORICS 2011, IEEE Security & Privacy 2012, ACM CCS 2013, ACM CCS 2014, and ACM CCS 2015 (see http://www.trusted-workshop.de for details). \n \nThe fast and steady developments in sensor technologies, micro-electromechanical systems (MEMS), Internet infrastructure and communication standards have given rise to a new disruptive technology: the Internet of Things (IoT). As a key enabler for building a connected world, IoT allows people and objects in the physical world to interact with each other and create various smart environments in an autonomous manner. It has been estimated that the IoT ecosystem will bring over 28 billion connected autonomous things by 2020. As IoT continues to gain traction and more connected devices come to market, security and privacy will become major concerns. The resource-constrained smart embedded devices in IoT systems as well as the inherent complexity of IoT system architectures have posed new challenges for designing and implementing security and privacy mechanisms for protecting emerging IoT applications. Given the above, major themes of TrustED 2016 include security and privacy aspects of the Internet of Things and in particular of embedded devices as parts of cyber physical systems and their environments. It aims to bring together experts from academia and research institutes, industry, and government in the field of security and privacy in cyber physical systems to discuss and investigate the problems, challenges, and recent scientific and technological developments in this field. \n \nThis year, twelve papers have been submitted. Each paper received at least three reviews, which were followed by an online discussion to decide on the program. Papers co-authored by one PC chair were exclusively handled by the other. The program committee accepted six papers that cover a variety of topics, including Physical Unclonable Functions, side-channel attacks, physical layer security, hardware security, and system security. In addition to the technical program, the workshop featured three internationally highly renowned speakers: Aurelien Francillon, Marcel Medwed, and David Oswald.","PeriodicalId":130056,"journal":{"name":"Proceedings of the 6th International Workshop on Trustworthy Embedded Devices","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 6th International Workshop on Trustworthy Embedded Devices","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2995289","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

The 6th International Workshop on Trustworthy Embedded Devices (TrustED 2016) was held October 28th, 2016 in Hofburg Palace, Vienna, Austria, and has been co-located with the 23rd ACM Conference on Computer and Communications Security (CCS 2016). TrustED 2016 is a continuation of previous workshops in this series, which were held in conjunction with ESORICS 2011, IEEE Security & Privacy 2012, ACM CCS 2013, ACM CCS 2014, and ACM CCS 2015 (see http://www.trusted-workshop.de for details). The fast and steady developments in sensor technologies, micro-electromechanical systems (MEMS), Internet infrastructure and communication standards have given rise to a new disruptive technology: the Internet of Things (IoT). As a key enabler for building a connected world, IoT allows people and objects in the physical world to interact with each other and create various smart environments in an autonomous manner. It has been estimated that the IoT ecosystem will bring over 28 billion connected autonomous things by 2020. As IoT continues to gain traction and more connected devices come to market, security and privacy will become major concerns. The resource-constrained smart embedded devices in IoT systems as well as the inherent complexity of IoT system architectures have posed new challenges for designing and implementing security and privacy mechanisms for protecting emerging IoT applications. Given the above, major themes of TrustED 2016 include security and privacy aspects of the Internet of Things and in particular of embedded devices as parts of cyber physical systems and their environments. It aims to bring together experts from academia and research institutes, industry, and government in the field of security and privacy in cyber physical systems to discuss and investigate the problems, challenges, and recent scientific and technological developments in this field. This year, twelve papers have been submitted. Each paper received at least three reviews, which were followed by an online discussion to decide on the program. Papers co-authored by one PC chair were exclusively handled by the other. The program committee accepted six papers that cover a variety of topics, including Physical Unclonable Functions, side-channel attacks, physical layer security, hardware security, and system security. In addition to the technical program, the workshop featured three internationally highly renowned speakers: Aurelien Francillon, Marcel Medwed, and David Oswald.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
第六届可信赖嵌入式设备国际研讨会论文集
第六届可信赖嵌入式设备国际研讨会(TrustED 2016)于2016年10月28日在奥地利维也纳霍夫堡宫举行,并与第23届ACM计算机与通信安全会议(CCS 2016)同期举行。可信2016是该系列之前研讨会的延续,这些研讨会与ESORICS 2011、IEEE安全与隐私2012、ACM CCS 2013、ACM CCS 2014和ACM CCS 2015(详见http://www.trusted-workshop.de)一起举行。传感器技术、微机电系统(MEMS)、互联网基础设施和通信标准的快速稳定发展催生了一种新的颠覆性技术:物联网(IoT)。作为构建互联世界的关键推动者,物联网允许物理世界中的人和物体相互交互,并以自主的方式创建各种智能环境。据估计,到2020年,物联网生态系统将带来超过280亿个连接的自主事物。随着物联网继续获得牵引力和更多连接设备进入市场,安全和隐私将成为主要问题。物联网系统中资源受限的智能嵌入式设备以及物联网系统架构固有的复杂性,为设计和实现保护新兴物联网应用的安全和隐私机制提出了新的挑战。鉴于上述情况,可信2016的主要主题包括物联网的安全和隐私方面,特别是嵌入式设备作为网络物理系统及其环境的一部分。它旨在汇集来自学术界和研究机构、工业界和政府在网络物理系统安全和隐私领域的专家,讨论和调查该领域的问题、挑战和最新的科学和技术发展。今年共提交了12篇论文。每篇论文至少会收到三篇评议,评议之后会有一个在线讨论来决定项目。由一位PC主席共同撰写的论文由另一位专门处理。计划委员会接受了六篇论文,涵盖了各种主题,包括物理不可克隆功能,侧信道攻击,物理层安全,硬件安全和系统安全。除了技术课程外,研讨会还邀请了三位国际知名的演讲者:Aurelien Francillon, Marcel Medwed和David Oswald。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Side-Channel Attacks on Fingerprint Matching Algorithms Wireless Attacks on Automotive Remote Keyless Entry Systems Online Reliability Testing for PUF Key Derivation Evaluation of Latch-based Physical Random Number Generator Implementation on 40 nm ASICs Proceedings of the 6th International Workshop on Trustworthy Embedded Devices
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1