skip to main content
10.1145/2666141acmconferencesBook PagePublication PagesccsConference Proceedingsconference-collections
TrustED '14: Proceedings of the 4th International Workshop on Trustworthy Embedded Devices
ACM2014 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security Scottsdale Arizona USA 3 November 2014
ISBN:
978-1-4503-3149-4
Published:
03 November 2014
Sponsors:
Next Conference
October 14 - 18, 2024
Salt Lake City , UT , USA
Bibliometrics
Skip Abstract Section
Abstract

The 4th International Workshop on Trustworthy Embedded Devices (TrustED 2014) was held on November 03rd, 2014, in Scottsdale, Arizona, USA, and it was co-located with the 21st ACM Conference on Computer and Communications Security (CCS 2014). TrustED 2014 is a continuation of previous workshops in this series, which were held in conjunction with ESORICS 2011, IEEE Security & Privacy 2012, and ACM CCS 2013 (see http://www.trusted-workshop.de for details).

The paradigm of ubiquitous computing and permanent, mobile connectivity has already started to become reality through modern technologies that allow for electronic systems to be embedded practically everywhere. However, with new opportunities come new risks, affecting security and privacy. Embedded devices differ significantly from ''classical'' systems, such as desktop PCs, in various aspects which include more severe constraints and an increased vulnerability with respect to physical or network attacks. The scope of TrustED is security of embedded devices in general with focus on cyber physical systems and their environments. It aims to bring together experts from academia and research institutes, industry, and government in the field of security and privacy in cyber physical systems to discuss and investigate the problems, challenges, and recent scientific and technological developments in this field.

This year, twelve papers have been submitted. Each paper received at least three reviews, which were followed by an online discussion to decide on the program. The program committee accepted five papers that cover a variety of topics, including Trusted Computing, efficient hardware implementations, and side-channel attacks. In addition to the technical program, the workshop featured five internationally highly renowned speakers: Yier Jin, Tiffany Hyun-Jin Kim, Christof Paar, Ahmad-Reza Sadeghi, and Gene Tsudik.

Skip Table Of Content Section
SESSION: Embedded Security Attacks and Countermeasures
abstract
Challenges in Remote Attestation of Low-End Embedded Devices

Embedded computing devices increasingly permeate many aspects of modern life: from medical to automotive, from building and factory automation to weapons, from avionics to home entertainment. Despite their specialized nature as well as limited resources ...

research-article
A Secure Algorithm for Task Scheduling against Side-channel Attacks

The problem of ordering task executions has been well studied under power, performance, and thermal constraints. However, it has been pursued less under security concerns. We have observed that different orders of task executions have different side-...

research-article
6LoWPAN Security: Avoiding Hidden Wormholes using Channel Reciprocity

6LoWPAN networks are 802.15.4-based wireless sensor Networks that seamlessly integrate with IPv6 networks using specially designed protocols. Unfortunately, 6LoWPAN networks are vulnerable to hidden wormholes. To detect and subsequently avoid hidden ...

SESSION: System Security
abstract
Beasty Memories: The Quest for Practical Defense against Code Reuse Attacks

Code reuse attacks such as return-oriented programming (ROP) are predominant attack techniques that are extensively used to exploit vulnerabilities in modern software programs. ROP maliciously combines short instruction sequences (gadgets) residing in ...

research-article
Providing Root of Trust for ARM TrustZone using On-Chip SRAM

We present the design, implementation and evaluation of the root of trust for the Trusted Execution Environment (TEE) provided by ARM TrustZone based on the on-chip SRAM Physical Unclonable Functions (PUFs). We first implement a building block which ...

SESSION: TPMs and Identity Management
research-article
Citizen Electronic Identities using TPM 2.0

Electronic Identification (eID) is becoming commonplace in several European countries. eID is typically used to authenticate to government e-services, but is also used for other services, such as public transit, e-banking, and physical security access ...

abstract
Challenges of Establishing Trust in Online Entities and Beyond

In today's Internet, authenticating online entities is challenging since people lack the real-world cues upon which to base their context-dependent trust decisions. For example, how can a user confirm that a Facebook invitation truly originates from the ...

SESSION: Efficient Implementations
research-article
Simple AEAD Hardware Interface (SÆHI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor

Simple AEAD Hardware Interface (SÆHI) is a hardware cryptographic interface aimed at CAESAR Authenticated Encryption with Associated Data (AEAD) algorithms. Cryptographic acceleration is typically achieved either with a coprocessor or via instruction ...

SESSION: Hardware and System Attacks
abstract
How to Build Hardware Trojans

Countless systems ranging from consumer electronics to military equipment are dependent on integrated circuits (ICs). A surprisingly large number of such systems are already security critical, e.g., medical devices, automotive electronics, or SCADA ...

abstract
Embedded System Security in Smart Consumer Electronics

Advances in manufacturing and emerging technologies in miniaturization and reduction of power consumption have proven to be a pivotal point in mankind's progress. The once advanced machines that occupied entire buildings and needed hundreds of engineers ...

Contributors
  • Arizona State University
  • University of Mannheim
  • Robert Bosch GmbH
Index terms have been assigned to the content through auto-classification.

Recommendations

Acceptance Rates

TrustED '14 Paper Acceptance Rate5of12submissions,42%Overall Acceptance Rate24of49submissions,49%
YearSubmittedAcceptedRate
TrustED '1612650%
TrustED '1511655%
TrustED '1412542%
TrustED '1314750%
Overall492449%