Welcome to the 4th Workshop on Embedded Systems Security (WESS) in Grenoble, France. WESS 2009 is a workshop of Embedded Systems Week 2009 (ESWEEK 2009), a leading event on embedded systems research and development.
WESS 2009 is the fourth workshop in a series that started in 2006 as a workshop of EMSOFT, one of the leading conferences of Embedded Systems Week. Currently, WESS is a workshop of ESWEEK and provides a forum that brings together researchers and developers of embedded systems security, a technical area of increasing importance in the emerging networked embedded systems world. Embedded systems security is an emerging field of interdisciplinary research and development, combining expertise from such fields as systems architecture, cryptography, signal processing, etc. The workshop targets to provide a forum for experts in these fields, so that they can meet, present their results and identify common research opportunities.
WESS 2009 is the first workshop in the series with official proceedings. WESS was initiated as a workshop without proceedings, in order to provide a forum focusing on idea presentation. The high interest of participants, however, in a more formal workshop in the area led us to organize this year's WESS with formal proceedings. ACM has supported us in this direction, publishing the proceedings in the ACM Digital Library, a significant recognition for our efforts. We thank ACM for their support.
Proceeding Downloads
Non-deterministic processors: FPGA-based analysis of area, performance and security
Finding a suitable balance between performance and physical security can be a significant challenge when implementing cryptographic software. Although asymmetric primitives often afford inexpensive countermeasures against side-channel attack as a result ...
Applications of trusted computing in pervasive smart camera networks
Pervasive Smart Cameras are embedded computer vision systems bringing together the research areas of smart cameras and wireless sensor networks. Besides traditional areas like video surveillance or traffic monitoring, small, cheap and powerful camera ...
Analysis of the split mask countermeasure for embedded systems
We analyze a countermeasure against differential power and electromagnetic attacks that was recently introduced under the name of split mask. We show a general weakness of the split mask countermeasure that makes standard DPA attacks with a full key ...
Negotiation of security services: a multi-criteria decision approach
Presently, one of the most important challenges in securing communications between resource-constrained mobile systems is the optimization of the trade-off between energy and performance of security services. Any adopted security solution should be able ...
Stack bounds analysis for microcontroller assembly code
An important criterion for correctness of embedded software is stack safety, which requires that the stack must never overflow. This paper presents a static analysis for assembly code that determines upper and lower bounds of the stack. These bounds ...
PIFT: efficient dynamic information flow tracking using secure page allocation
Dynamic information flow tracking (DIFT) has been an effective security countermeasure for both low-level memory corruptions and high-level semantic attacks. However, many software approaches suffers from large performance degradation and hardware ...
Automatic detection of fault attack and countermeasures
Security of smart cards is continuously threatened by many software and hardware attacks. Those attacks focus on giving secret information that are stored in the card like PIN code, secret cryptographic keys, or on granting access to some restricted ...
Side channel analysis of AVR XMEGA crypto engine
AVR XMEGA is the recent general-purpose 8-bit microcontroller from Atmel featuring symmetric crypto engines. We analyze the resistance of XMEGA crypto engines to side channel attacks. We reveal the relatively strong side channel leakage of the AES ...
Hardware evaluation of the Luffa hash family
Efficient hardware architectures for the Luffa hash algorithm are proposed in this work. We explore different tradeoffs and propose several architectures, targeting both compact and high-throughput designs. Implemented using UMC 0.13 μm CMOS standard ...
- Proceedings of the 4th Workshop on Embedded Systems Security
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
WESS '13 | 21 | 8 | 38% |
Overall | 21 | 8 | 38% |