Science of Security

A body of knowledge containing laws, axioms and provable theories relating to some aspect of system security.
event

Visible to the public  DSD 2018
Aug 29, 2018 7:00 am - Aug 31, 2018 6:00 pm CEST

21st Euromicro Conference on Digital System Design (DSD 2018)

Scope

The Euromicro Conference on Digital System Design (DSD) addresses all aspects of (embedded, pervasive and high- performance) digital and mixed HW/SW system engineering, covering the whole design trajectory from specification down to micro-architectures, digital circuits and VLSI implementations. It is a forum for researchers and engineers from academia and industry working on advanced investigations, developments and applications.

event

Visible to the public  IoTSec 2018
Apr 17, 2018 7:00 am - 7:00 pm EDT

1st International Workshop on Security and Privacy for the Internet-of-Things (IoTSec)

to be co-located with the 3rd ACM/IEEE International Conference on Internet of Things Design & Implementation (IoTDI) 2018

event

Visible to the public  RAW 2018
May 21, 2018 7:00 am - May 22, 2018 6:00 pm PDT

The 25th Anniversary of Reconfigurable Architectures Workshop (RAW 2018)

The 25th Reconfigurable Architectures Workshop (RAW 2018) will be held in Vancouver, British Columbia CANADA in May 2018. RAW 2018 is associated with the 32nd Annual IEEE International Parallel & Distributed Processing Symposium (IEEE IPDPS 2018) and is sponsored by the IEEE Computer Society and the Technical Committee on Parallel Processing.

forum

Visible to the public CfP: IEEE Computer Special Issue on Resiliency in CPS

CALL FOR PAPERS

IEEE Computer Special Issue on Resiliency in CPS

Important dates:

  • Abstract submission (by e-mail to co-1018@computer.org): 1 February 2018
  • Full paper submission: 1 March 2018
  • Expected publication date: October 2018

Guest editors:

file

Visible to the public CPS: Small: Integrated Reconfigurable Control and Moving Target Defense for Secure Cyber-Physical Systems

Abstract: Cyber-physical systems have been increasingly subject to cyber-attacks including code injection and code reuse attacks. With the tightly coupled nature of cyber components with the physical domain, these attacks have the potential to cause significant damage if critical applications such as automobiles are compromised. Instruction Set Randomization and Address Space Randomization have been commonly proposed to address these types of attacks.