Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2808414acmconferencesBook PagePublication PagesccsConference Proceedingsconference-collections
TrustED '15: Proceedings of the 5th International Workshop on Trustworthy Embedded Devices
ACM2015 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CCS'15: The 22nd ACM Conference on Computer and Communications Security Denver Colorado USA 16 October 2015
ISBN:
978-1-4503-3828-8
Published:
16 October 2015
Sponsors:
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN
Next Conference
October 13 - 17, 2025
Taipei , Taiwan
Reflects downloads up to 23 Dec 2024Bibliometrics
Skip Abstract Section
Abstract

The 5th International Workshop on Trustworthy Embedded Devices (TrustED 2015) was held October 16th, 2015 in Denver, Colorado, USA, and has been co-located with the 22nd ACM Conference on Computer and Communications Security (CCS 2015). TrustED 2015 is a continuation of previous workshops in this series, which were held in conjunction with ESORICS 2011, IEEE Security & Privacy 2012, ACM CCS 2013, and ACM CCS 2014 (see http://www.trusted-workshop.de for details).

The Internet of Things promises to make reality Mark Weisser's vision of ubiquitous computation set out in his 1991 influential paper. This vision has already started to become reality through modern technologies that allow for electronic systems to be embedded practically everywhere. Yet to make such vision successful, it is widely acknowledged that security of super large distributed systems has to be guaranteed and the privacy of the collected data protected. The Internet of Things, made possible through the wide deployment of embedded devices, differs significantly from "classical" systems, such as desktop (networked) PCs, in various aspects, which include: severe computational, memory, and power constraints, lack of advanced user interfaces, an increased vulnerability with respect to physical or network attacks, inability to provide strong hardware security guarantees, and as mentioned previously, their tendency to collect potentially highly privacy sensitive data. Given the above, major themes of TrustED 2015 include security and privacy aspects of the Internet of Things and in particular of embedded devices as parts of cyber physical systems and their environments. It aims to bring together experts from academia and research institutes, industry, and government in the field of security and privacy in cyber physical systems to discuss and investigate the problems, challenges, and recent scientific and technological developments in this field.

This year, eleven papers have been submitted. Each paper received at least three reviews, which were followed by an online discussion to decide on the program. Papers co-authored by one PC chair were exclusively handled by the other. The program committee accepted six papers that cover a variety of topics, including Physical Unclonable Functions, side-channel attacks, hardware security, system security, and digital rights management in embedded platforms. In addition to the technical program, the workshop featured four internationally highly renowned speakers: Geremy Condra, Marten van Dijk, Jakub Szefer, and André Weimerskirch.

Skip Table Of Content Section
SESSION: Session 1: Hardware Security 1
invited-talk
Hardware Security and its Adversaries

Cryptographic reasoning has embraced the idea of "provable security", however, as soon as crypto protocols and primitives are implemented in SW/HW, security and trust become relative to the attacker who may also attempt to embed Trojans, malicious ...

research-article
Characterizing Composite User-Device Touchscreen Physical Unclonable Functions (PUFs) for Mobile Device Authentication

Mobile systems have unique authentication requirements. A composite user-device identity that is computationally difficult to decompose into its user and device contribution is better suited for mobile context authentication for services such as Google ...

research-article
On the Systematic Drift of Physically Unclonable Functions Due to Aging

In recent years Physically Unclonable Functions (PUFs) have been proposed as a promising building block for security related scenarios like key storage and authentication. PUFs are physical systems and as such their responses are inherently noisy, ...

research-article
Faster Leakage Detection and Exploitation

Higher-order side-channel analysis has become very widespread due to the popularity of side channel countermeasures. However, these analysis methods become increasingly expensive in terms of computation time if the attacker has no prior knowledge about ...

SESSION: Session 2: Hardware Security 2
research-article
Security-Aware Design Flow for 2.5D IC Technology

The increasing trend of outsourced fabrication in integrated circuit (IC) supply chain makes IC designs vulnerable to Intellectual Property (IP) piracy by untrusted foundries. 2.5D IC technology has shown the capability to counter this threat. By ...

invited-talk
A Plea for Incremental Work in IoT Security

In arenas like IoT where there are a lot of unanswered questions it's often tempting to tackle the problem holistically-- developing a radically new trust model, or expanding an arcane cryptographic primitive into the root of a new architecture. But I'...

SESSION: Session 3: System Security 1
invited-talk
Leveraging Processor Performance Counters for Security and Performance

Modern processors come equipped with hundreds of hardware performance counters, which count variety of events in the processor, anything from floating point operations retired to cache misses. In recent years researchers have begun to use these ...

research-article
Content Protection in HTML5 TV Platforms: Towards Browser-agnostic DRM and Cloud UI Environments

The integration of DRM into browser environments resulted in a huge disruption on how DRM systems work. W3C has specified a direct integration of DRM into a browser over HTML5 Encrypted Media Extensions (EME) interface. Desktop browsers like Chrome, ...

SESSION: Session 4: System Security 2
invited-talk
An Overview of Automotive Cybersecurity: Challenges and Solution Approaches

In recent years, several academic teams demonstrated that it is possible to hack vehicles via every available interface (telematics, cellular, Bluetooth, etc.). In this presentation a brief overview of recent results will be presented, and current ...

research-article
XNPro: Low-Impact Hypervisor-Based Execution Prevention on ARM

As virtually all smartphones today run general purpose operating systems, they have to consider malware attacks, with rootkits being among the most hideous ones. Since rootkits execute with the same privileges as the OS kernel, traditional ...

Contributors
  • Colorado State University
  • University at Buffalo, The State University of New York

Recommendations

Acceptance Rates

TrustED '15 Paper Acceptance Rate 6 of 11 submissions, 55%;
Overall Acceptance Rate 24 of 49 submissions, 49%
YearSubmittedAcceptedRate
TrustED '1612650%
TrustED '1511655%
TrustED '1412542%
TrustED '1314750%
Overall492449%