[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1631716acmconferencesBook PagePublication PagesesweekConference Proceedingsconference-collections
WESS '09: Proceedings of the 4th Workshop on Embedded Systems Security
ACM2009 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ESWeek '09: Fifth Embedded Systems Week Grenoble France 15 October 2009
ISBN:
978-1-60558-700-4
Published:
15 October 2009
Sponsors:
CEDA, SIGBED, SIGDA, IEEE CAS, SIGMICRO, IEEE CS

Reflects downloads up to 11 Dec 2024Bibliometrics
Skip Abstract Section
Abstract

Welcome to the 4th Workshop on Embedded Systems Security (WESS) in Grenoble, France. WESS 2009 is a workshop of Embedded Systems Week 2009 (ESWEEK 2009), a leading event on embedded systems research and development.

WESS 2009 is the fourth workshop in a series that started in 2006 as a workshop of EMSOFT, one of the leading conferences of Embedded Systems Week. Currently, WESS is a workshop of ESWEEK and provides a forum that brings together researchers and developers of embedded systems security, a technical area of increasing importance in the emerging networked embedded systems world. Embedded systems security is an emerging field of interdisciplinary research and development, combining expertise from such fields as systems architecture, cryptography, signal processing, etc. The workshop targets to provide a forum for experts in these fields, so that they can meet, present their results and identify common research opportunities.

WESS 2009 is the first workshop in the series with official proceedings. WESS was initiated as a workshop without proceedings, in order to provide a forum focusing on idea presentation. The high interest of participants, however, in a more formal workshop in the area led us to organize this year's WESS with formal proceedings. ACM has supported us in this direction, publishing the proceedings in the ACM Digital Library, a significant recognition for our efforts. We thank ACM for their support.

Skip Table Of Content Section
research-article
Non-deterministic processors: FPGA-based analysis of area, performance and security
Article No.: 1, Pages 1–10https://doi.org/10.1145/1631716.1631717

Finding a suitable balance between performance and physical security can be a significant challenge when implementing cryptographic software. Although asymmetric primitives often afford inexpensive countermeasures against side-channel attack as a result ...

research-article
Applications of trusted computing in pervasive smart camera networks
Article No.: 2, Pages 1–10https://doi.org/10.1145/1631716.1631718

Pervasive Smart Cameras are embedded computer vision systems bringing together the research areas of smart cameras and wireless sensor networks. Besides traditional areas like video surveillance or traffic monitoring, small, cheap and powerful camera ...

research-article
Analysis of the split mask countermeasure for embedded systems
Article No.: 3, Pages 1–10https://doi.org/10.1145/1631716.1631719

We analyze a countermeasure against differential power and electromagnetic attacks that was recently introduced under the name of split mask. We show a general weakness of the split mask countermeasure that makes standard DPA attacks with a full key ...

research-article
Negotiation of security services: a multi-criteria decision approach
Article No.: 4, Pages 1–9https://doi.org/10.1145/1631716.1631720

Presently, one of the most important challenges in securing communications between resource-constrained mobile systems is the optimization of the trade-off between energy and performance of security services. Any adopted security solution should be able ...

research-article
Stack bounds analysis for microcontroller assembly code
Article No.: 5, Pages 1–9https://doi.org/10.1145/1631716.1631721

An important criterion for correctness of embedded software is stack safety, which requires that the stack must never overflow. This paper presents a static analysis for assembly code that determines upper and lower bounds of the stack. These bounds ...

research-article
PIFT: efficient dynamic information flow tracking using secure page allocation
Article No.: 6, Pages 1–8https://doi.org/10.1145/1631716.1631722

Dynamic information flow tracking (DIFT) has been an effective security countermeasure for both low-level memory corruptions and high-level semantic attacks. However, many software approaches suffers from large performance degradation and hardware ...

research-article
Automatic detection of fault attack and countermeasures
Article No.: 7, Pages 1–7https://doi.org/10.1145/1631716.1631723

Security of smart cards is continuously threatened by many software and hardware attacks. Those attacks focus on giving secret information that are stored in the card like PIN code, secret cryptographic keys, or on granting access to some restricted ...

research-article
Side channel analysis of AVR XMEGA crypto engine
Article No.: 8, Pages 1–7https://doi.org/10.1145/1631716.1631724

AVR XMEGA is the recent general-purpose 8-bit microcontroller from Atmel featuring symmetric crypto engines. We analyze the resistance of XMEGA crypto engines to side channel attacks. We reveal the relatively strong side channel leakage of the AES ...

research-article
Hardware evaluation of the Luffa hash family
Article No.: 9, Pages 1–6https://doi.org/10.1145/1631716.1631725

Efficient hardware architectures for the Luffa hash algorithm are proposed in this work. We explore different tradeoffs and propose several architectures, targeting both compact and high-throughput designs. Implemented using UMC 0.13 μm CMOS standard ...

Contributors
  • Computer Technology Institute and Press
  • Georgia Institute of Technology
  1. Proceedings of the 4th Workshop on Embedded Systems Security
    Please enable JavaScript to view thecomments powered by Disqus.

    Recommendations

    Acceptance Rates

    Overall Acceptance Rate 8 of 21 submissions, 38%
    YearSubmittedAcceptedRate
    WESS '1321838%
    Overall21838%