DATE 2011

A6 Secure, Dependable and Adaptive Systems

Printer-friendly versionPDF version

Secure embedded systems need a combination of hardware, software and embedded techniques to succeed. Indeed, the weakest link in the security chain determines the overall system security. This topic therefore invites papers on novel technologies and experiences for specific security problems as well as overall design integration methods for secure systems-on-chip and embedded systems. Topics of interest are situated at all design abstraction levels and include novel techniques for embedded cryptography; modeling, characterization, simulation and associated countermeasures for side-channel, fault and other physical attacks; random numbers generation, embedded secure processors and co-processors, trusted computing, off-chip memories and network on chip enciphering and integrity checking, trust establishment and attestation; implementation of security applications; hardware enabled security, including physically encloneable functions, and more. Papers on dependable and adaptive systems are also invited to this topic.
 

Groups: