http://moss.csc.ncsu.edu/~mueller/esns07
February 22-23, 2007, Raleigh, NC, USA
CFP as text
Background:
Embedded systems and networks are used heavily in critical defense
applications. Malicious or accidental failures in embedded
systems can have dire consequences. The integrity of embedded software
infrastructures, such as configuration and code, is of utmost
importance. The autonomous nature of embedded systems also poses new
challenges in the context of system integrity. Since embedded
systems are reactive, unexpected environment events or environment
events generated by a malicious adversary can cause failures in
embedded systems and networks. Embedded systems and networks
often have to operate autonomously in a changing environment.
Therefore, infrastructure of an embedded system has to be updated to
adapt its behavior to the change in environment or the overall mission.
Unauthorized or unverified updates to the infrastructure of an embedded
system can compromise its integrity. This workshop intends to bring
researchers that have expertise in a variety of techniques for ensuring
the security and integrity of mission-critical embedded systems and
networks.
Objective of the workshop:
The purpose of this workshop is for a group of experts to present the
state of art of embedded system and network security research and to
discuss and develop a research roadmap. Each invitee will have 20
minutes (sharp) to present his/her research interests/project. A
30-minute group discussion / Q&A seesion will also be scheduled at
the end of each session.
The research areas covered under the
workshop (but not limited to) will be:
- Embedded and real-time system security
- Wireless sensor network security
- MANET security
- Mobile phone security
- Program verification/validation in embedded systems
- Trusted computing platform and its application in embedded systems
and networks
The workshop is by invitation only. You should contribute a short
position paper (up to 2 pages) addressing one or several workshop
topics listed above. The position papers are intended for facilitating
discussions at the workshop.
1. What are the three fundamental limitations of today's
security mechanisms?
2. What are the three most important research challenges?
3. What are promising innovations and abstractions for
future systems?
4. What are possible milestones for the next 5 to10 years?
Submission:
Invited participants should submit
position papers describing grand challenges (not their solutions) and
new research directions to esns06@csc.ncsu.edu.
Submissions are restricted to 2
pages. Submissions should be
e-mailed to one of the workshop organizers.
Preferred formats are PDF or PostScript.
Important Dates:
Logistics:
All participants should arrive the day before the venue and schedule their return flight no earlier than 3pm or the last day (or the following day). Please make your own travel arrangements (consult the list of non-stop destinations from RDU). You will be reimbursed in full (assuming regular coach fares, non-refundable).
Hotel:
We have already reserved a room for you at the Holiday Inn Brownstone,
1707
Hillsborough St, Raleigh, NC, phone: 919-828-0811.
Workshop site:
The workshop will be held in room 3002 in Engineering Building II on
the Centennial
Campus of NC State University. Check this map for directions
to the workshop site from the hotel. Here are directions from
the airport.
Workshop Program + Slides (coming later):
Thursday, Feb 22, 2007
9:00-10:30
Adversary Models (Chair: Peng Ning)
Virgil Gligor (slides)
Radha
Poovendran (slides)
Suman Banerjee (slides)
session summary
10:30-11:00
break
11:00-12:30
Languages and Software Engineering (Chair: Frank
Mueller)
Jack Davidson (slides)
Phil Koopman (slides)
session summary
12:30-2:00 lunch
2:00-3:30
Software Security (Chair: Purush Iyer)
Adrian Perrig (slides)
Somesh Jha (slides)
Kang Shin (slides)
session summary
3:30-4:00
break
4:00-5:30
Hardware Security (Chair:
Tao Xie)
Sean Smith (slides)
Hsien-Hsin Lee (slides)
Yan Solihin (slides)
session summary
6:30
dinner
Friday, Feb 23, 2007
8:00-8:30
working breakfast
8:30-10:00
Robust Distributed Services (Chair: Cliff Wang)
Mike Reiter (slides)
John Stankovic (slides)
Gene Tsudik (slides)
session summary
10:00-10:30
break
10:30-12:00
Wireless
Sensor Networks, MANET and Cellular
Security (Chair: Peng Ning)
12:00-2:00 working lunch: summary & outlook
Online Proceedings (coming later):
Organizers:
Cliff Wang
(ARO)
Peng Ning (NCSU)
Frank Mueller (NCSU)
Kang Shin (U Mich)
John Stankovic (UVA)
Phil Koopman (CMU)
Wenliang Du (Syracuse U.)
Virgil Gligor (UMD)
Radha Poovendran (UW)
Adrian Perrig (CMU)
Gene Tsudik (UCI)
Mike Reiter (CMU)
Jack Davidson UVA)
Hsien-Hsin Lee (GaTech)
Suman Banerjee (U Wisc.)
Somesh Jha (U Wisc.)
Sean Smith (Dartmouth U.)
Wenye Wang (NCSU)
Purush Iyer (NCSU)
Yan Solihin (NCSU)
Tao Xie (NCSU)