- Sponsor:
- sigsac
The 4th International Workshop on Trustworthy Embedded Devices (TrustED 2014) was held on November 03rd, 2014, in Scottsdale, Arizona, USA, and it was co-located with the 21st ACM Conference on Computer and Communications Security (CCS 2014). TrustED 2014 is a continuation of previous workshops in this series, which were held in conjunction with ESORICS 2011, IEEE Security & Privacy 2012, and ACM CCS 2013 (see http://www.trusted-workshop.de for details).
The paradigm of ubiquitous computing and permanent, mobile connectivity has already started to become reality through modern technologies that allow for electronic systems to be embedded practically everywhere. However, with new opportunities come new risks, affecting security and privacy. Embedded devices differ significantly from ''classical'' systems, such as desktop PCs, in various aspects which include more severe constraints and an increased vulnerability with respect to physical or network attacks. The scope of TrustED is security of embedded devices in general with focus on cyber physical systems and their environments. It aims to bring together experts from academia and research institutes, industry, and government in the field of security and privacy in cyber physical systems to discuss and investigate the problems, challenges, and recent scientific and technological developments in this field.
This year, twelve papers have been submitted. Each paper received at least three reviews, which were followed by an online discussion to decide on the program. The program committee accepted five papers that cover a variety of topics, including Trusted Computing, efficient hardware implementations, and side-channel attacks. In addition to the technical program, the workshop featured five internationally highly renowned speakers: Yier Jin, Tiffany Hyun-Jin Kim, Christof Paar, Ahmad-Reza Sadeghi, and Gene Tsudik.
Proceeding Downloads
Challenges in Remote Attestation of Low-End Embedded Devices
Embedded computing devices increasingly permeate many aspects of modern life: from medical to automotive, from building and factory automation to weapons, from avionics to home entertainment. Despite their specialized nature as well as limited resources ...
A Secure Algorithm for Task Scheduling against Side-channel Attacks
The problem of ordering task executions has been well studied under power, performance, and thermal constraints. However, it has been pursued less under security concerns. We have observed that different orders of task executions have different side-...
6LoWPAN Security: Avoiding Hidden Wormholes using Channel Reciprocity
6LoWPAN networks are 802.15.4-based wireless sensor Networks that seamlessly integrate with IPv6 networks using specially designed protocols. Unfortunately, 6LoWPAN networks are vulnerable to hidden wormholes. To detect and subsequently avoid hidden ...
Beasty Memories: The Quest for Practical Defense against Code Reuse Attacks
Code reuse attacks such as return-oriented programming (ROP) are predominant attack techniques that are extensively used to exploit vulnerabilities in modern software programs. ROP maliciously combines short instruction sequences (gadgets) residing in ...
Providing Root of Trust for ARM TrustZone using On-Chip SRAM
We present the design, implementation and evaluation of the root of trust for the Trusted Execution Environment (TEE) provided by ARM TrustZone based on the on-chip SRAM Physical Unclonable Functions (PUFs). We first implement a building block which ...
Citizen Electronic Identities using TPM 2.0
Electronic Identification (eID) is becoming commonplace in several European countries. eID is typically used to authenticate to government e-services, but is also used for other services, such as public transit, e-banking, and physical security access ...
Challenges of Establishing Trust in Online Entities and Beyond
In today's Internet, authenticating online entities is challenging since people lack the real-world cues upon which to base their context-dependent trust decisions. For example, how can a user confirm that a Facebook invitation truly originates from the ...
Simple AEAD Hardware Interface (SÆHI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor
Simple AEAD Hardware Interface (SÆHI) is a hardware cryptographic interface aimed at CAESAR Authenticated Encryption with Associated Data (AEAD) algorithms. Cryptographic acceleration is typically achieved either with a coprocessor or via instruction ...
How to Build Hardware Trojans
Countless systems ranging from consumer electronics to military equipment are dependent on integrated circuits (ICs). A surprisingly large number of such systems are already security critical, e.g., medical devices, automotive electronics, or SCADA ...
Embedded System Security in Smart Consumer Electronics
Advances in manufacturing and emerging technologies in miniaturization and reduction of power consumption have proven to be a pivotal point in mankind's progress. The once advanced machines that occupied entire buildings and needed hundreds of engineers ...
Index Terms
- Proceedings of the 4th International Workshop on Trustworthy Embedded Devices
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
TrustED '16 | 12 | 6 | 50% |
TrustED '15 | 11 | 6 | 55% |
TrustED '14 | 12 | 5 | 42% |
TrustED '13 | 14 | 7 | 50% |
Overall | 49 | 24 | 49% |