CCCCatalyzing the computing research community and enabling the pursuit of innovative, high-impact research.
  • Twitter
  • Facebook
  • Youtube
  • Rss
  • About
    • About CCC
    • Council Members
    • Council Meetings
    • CCC Council Nominations
    • Governing Documents
    • FAQ
    • Contact
  • Visioning
    • Visioning Activities
      • 2021
      • 2020
      • 2019
      • 2018
      • 2017
      • 2016
      • 2015
      • 2014
      • 2013
      • 2012
      • 2011 and Prior Years
    • CS for Social Good White Paper Competition
    • Blue Sky
    • Workshop Reports
    • RFP – Creating Visions for Computing Research
    • Robotics Roadmap
  • Leadership Development
    • Call for Council Nominations
    • Leadership in Science Policy Institute
    • Big Data Regional Hubs
    • Postdoc Best Practices
      • Postdoc Best Practice Final Reports
      • Postdoc Best Practice Resources
    • CIFellows
      • CIFellows 2020: For the Record
      • Apply for the CI Fellows 2020 Program
      • CI Fellows 2014 Workshop
      • 2011 Class
      • 2010 Class
      • 2009 Class
      • Assessment
      • Success Stories
      • Diversity
  • Task Forces
    • Cybersecurity and Cybertrust
    • Re**ing Computing
    • Responsible Computing
    • Technology for a Connected & Distributed Life
    • AI Working Group
    • Foundations Working Group
    • Past Task Forces
  • Resources
    • CCC Call for Content
    • Workshop Reports
    • CCC-Led White Papers
    • Presentations
    • CCC Responds to the Community
    • Recent CCC Activities
    • Ongoing CCC Activities
    • Computing Research in Action
    • Computing Research Highlights
    • Great Innovative Ideas
    • Event Videos
    • Catalyzing Computing Podcast
  • Events
    • Upcoming Events
    • Special Events
    • Past Events
    • CCC at AAAS
      • CCC at AAAS 2020
      • CCC at AAAS 2019
      • CCC at AAAS 2018
      • CCC at AAAS 2017
      • CCC at AAAS 2016
      • CCC at AAAS 2013
  • Blog
  • CCC by CS Area
    • AI /ML / Robotics
    • Architecture / Systems / Networking
    • Databases / Informatics / Data Science / HPC
    • Human-Computer Interaction / Graphics / Visualization
    • IoT / Ubiquitous
    • Programming Languages / Compilers / Software Engineering
    • Security / Privacy / Fairness
    • Theory / Algorithms
    • Miscellaneous
  • Podcast
  • Search
  • Menu

Leadership in Embedded Security Workshop


   Workshop Report   

August 12-13, 2018

Baltimore Marriott Waterfront
Baltimore Marriott Waterfront, Aliceanna Street, Baltimore, MD, USA



Event Contact

Ann Drobnis
adrobnis@cra.org


Event Type

2018 Events, 2018 Visioning Activities


Event Category

CCC


Tags

cyberphysical systems, cybersecurity, embedded security, internet of things, IoT

Overview

The Cybersecurity Taskforce of the CCC will hold a leadership workshop to envision the future of embedded security research and education from hardware to cyberphysical systems to human factors. The event will begin with a reception on the evening of August 12th and conclude by 5 PM on August 13th. It will be co-located with the 27th USENIX Security Symposium. The workshop co-chairs are Wayne Burleson (UMass Amherst), Kevin Fu (CCC Cybersecurity Taskforce Chair, University of Michigan), and Farinaz Koushanfar (UCSD).

Embedded systems such as pacemakers, autonomous vehicles, and the Internet of Things often have real-time constraints and electromechanical components that lead to qualitatively different vulnerabilities and solutions from traditional computing systems. Embedded security is the study of physical properties, computational properties, and human factors to protect such embedded systems from attack. 

Participants will consist of invited faculty members, industrial researchers, and government agency program managers selected based upon submission of a thought-provoking one-page position statement on embedded security.

Our event will consist of deep dive group discussions as well as short visionary talks by several international speakers to lend perspectives on successful strategies for funding embedded security research overseas. Confirmed panelists include:

US: Sam Fuller, CTO Emeritus of Analog Devices
Fuller
China: Wenyuan Xu, Zhejiang University
Wenyuan
Korea: Yongdae Kim, Korea Advanced Institute of Science and Technology
Yongdae
UK: Ross Anderson, University of Cambridge This text should be invisible 
Anderson

You can find the full list of panelists in the speakers tab.

The desired outcome of the meeting is a white paper synthesized from discussions and position papers to inform the National Science Foundation and other executive branch agencies on national strategic directions for academic research in embedded security to address gaps in knowledge and the student pipeline.

Applications are closed for this event. The workshop organizers will notify the selected attendees by June 15th. Please see the application tab for more information about the application process.

Agenda

August 12, 2018 (Sunday)

06:00 PM Welcome Reception | Bristol Room, 3rd Floor

August 13, 2018 (Monday)

08:00 AM Breakfast Available | Grand Ballroom Foyer, 3rd Floor
09:00 AM Welcome and Introduction | Dover Room, 3rd Floor
  • Workshop Overview
  • Lightning Slides
09:30 AM Keynote - Sam Fuller (Analog Devices) | Dover Room, 3rd Floor
10:00 AM Machine Learning and Embedded Security - Farinaz Koushanfar (UC San Diego) | Dover Room, 3rd Floor
10:20 AM Speaker Q&A | Dover Room, 3rd Floor
10:30 AM BREAK | Grand Ballroom Foyer, 3rd Floor
10:45 AM International Perspectives Panel | Dover Room, 3rd Floor
  • Ross Anderson, University of Cambridge – link to slides
  • Srdjan Capkun, ETH Zürich, Switzerland – link to slides
  • Yongdae Kim, Korea Advanced Institute of Science and Technology – link to slides
  • Wenyuan Xu, Zhejiang University – link to slides
11:45 AM Program Manager Panel | Dover Room, 3rd Floor
  • Brian Fitzgerald, FDA
  • Sandip Kundu, National Science Foundation – link to slides 
  • Douglas Maughn, Department of Homeland Security
  • Tomas Vagoun, NITRD – link to slides
12:45 PM Lunch | Dover Room, 3rd Floor
01:45 PM Group Breakout Sessions | Dover Room, 3rd Floor
03:00 PM BREAK | Grand Ballroom Foyer, 3rd Floor
03:15 PM Report Out and Group Discussion | Dover Room, 3rd Floor
04:00 PM Report Writing and Further Discussion | Dover Room, 3rd Floor
05:00 PM Conclude Workshop
Speakers

Confirmed panelists:

Ross Anderson, University of Cambridge
Anderson
Srdjan Capkun, ETH Zürich, Switzerland
Capkun
Brian Fitzgerald, FDA
Fitzgerald
Sam Fuller, CTO Emeritus of Analog Devices
Fuller
Yongdae Kim, Korea Advanced Institute of Science and Technology
Yongdae
Sandip Kundu, National Science FoundationThis text should be invisible
Kundu
Douglas Maughan, Department of Homeland Security
Maughn
Tomas Vagoun, NITRD
Vagoun
Wenyuan Xu, Zhejiang University
Wenyuan
Organizers
   Co-chairs
Kevin Fu, University of Michigan This text should be invisible 
Fu
Wayne Burleson, University of Massachusetts Amherst
Burleson
Farinaz Koushanfar, University of California, San Diego
Farinaz
   With Support from the CCC Cybersecurity Task Force
Nadya Bliss, Arizona State University
Bliss
Keith Marzullo, University of Maryland
Marzullo
Greg Morrisett, Cornell University
Morrisett
Logistics

The Computing Community Consortium (CCC) will cover domestic travel expenses for participants who desire it. Participants are asked to make their own travel arrangements to get to the workshop, including purchasing airline tickets. Following the workshop, CCC will circulate a reimbursement form that participants will need to complete and submit, along with copies of receipts for amounts exceeding $75.

In general, standard Federal travel policies apply: CCC will reimburse for non-refundable economy airfare on U.S. Flag carriers; and no alcohol will be covered.

For more information, please see the Guidelines for Participant Reimbursements from CCC.

Additional questions about the reimbursement policy should be directed to Ann Drobnis, CCC Director (adrobnis [at] cra.org).

Application

The workshop participants will be selected from among the responses to a call for 1-page position papers that address:

  • a grand challenge,
  • at a time-scale of 5-10 years out,
  • requiring multiple experts or subdisciplines,
  • identifying gaps in research,
  • and presenting compelling opportunities for embedded security research and education.

The following list suggests some possible topics for the position papers, but any embedded security topic is welcome. This list is not exhaustive, but represents the broad definition of embedded security.

  • Threat Models in Embedded Security
    • Side channels: Passive and Active
    • Sensors and Actuators
    • Physical attacks and defenses
    • Counterfeiting, trojans
    • Reverse engineering
    • IP theft
    • Tampering
    • Third party IP integration
  • Defenses:
    • Anti-counterfeit, anti-tamper, obfuscation
    • Embedded crypto: Symmetric and asymmetric, secure hashing, TRNG
    • Energy-constrained security
    • IP protection and tracing
    • Verification
  • Embedded Security Design Patterns
    • Computer architecture
    • HW-SW co-design
  • Applications
    • Industrial controls
    • Autonomous vehicles
    • Aviation
    • Medical devices
    • Power-grid
    • Smart homes
    • IoT
    • Operational Technology
  • Cyberphysical Security
  • Human Factors in Embedded Systems: Psychology, Sociology, Economics, Policy
  • Post-Quantum Cryptography in Embedded Systems
  • Security Economics
  • Protecting Legacy Systems

Applications are closed for this event. The workshop organizers will notify the selected attendees by June 15th.

The CCC will offer domestic travel reimbursement for all participants who desire it. See the logistics tab for more information.

Resources

Group Assignments:

  • Breakout Group 1 
  • Breakout Group 2
  • Breakout Group 3
  • Breakout Group 4
  • Breakout Group 5

 

CRA - Uniting Industry, Academia and Government to Advance Computing Research and Change the World.
CCC - Catalyzing the computing research community and enabling the pursuit of innovative, high-impact research.
Increasing the Success and Participation of Underrepresented Groups in Computing Research.
CRA-E - Addressing society’s need for a continuous supply of talented and well-educated computing researchers.
CERP - Promoting diversity in computing through evaluation and research.
CRA Home | Contact Us | Unsubscribe/Removal of Information | Terms of Use         © Copyright 2021 - CRA
Next Steps in Quantum Computing: Computer Science’s Role Early Career Researcher Symposium
Scroll to top