ARO Planning Workshop on Embedded Systems and Networks Security =============================================================== February 22-23, 2006 Raleigh, NC Background: Embedded systems and networks are used heavily in critical defense applications. Malicious or accidental failures in embedded systems can have dire consequences. The integrity of embedded software infrastructures, such as configuration and code, is of utmost importance. The autonomous nature of embedded systems also poses new challenges in the context of system integrity. Since embedded systems are reactive, unexpected environment events or environment events generated by a malicious adversary can cause failures in embedded systems and networks. Embedded systems and networks often have to operate autonomously in a changing environment. Therefore, infrastructure of an embedded system has to be updated to adapt its behavior to the change in environment or the overall mission. Unauthorized or unverified updates to the infrastructure of an embedded system can compromise its integrity. This workshop intends to bring researchers that have expertise in a variety of techniques for ensuring the security and integrity of mission-critical embedded systems and networks. Objective of the workshop: The purpose of this workshop is for a group of experts to present the state of art of embedded system and network security research and to discuss and develop a research roadmap. Each invitee will have 20 minutes to present his/her research interests/project. A group discussion will also be scheduled at the end of the workshop. The research areas covered under the workshop (but not limited to) will be: - Embedded and real-time system security - Wireless sensor network security - MANET security - Mobile phone security - Program verification/validation in embedded systems - Trusted computing platform and its application in embedded systems and networks You should contribute a short position paper (up to 2 pages) addressing one or several workshop topics listed above. The position papers are intended for facilitating discussions at the workshop. Each topic coverage should address the following questions: 1. What are the three fundamental limitations of today's security mechanisms? 2. What are the three most important research challenges? 3. What are promising innovations and abstractions for future systems? 4. What are possible milestones for the next 5 to10 years? Important Dates: - November 3: RSVP deadline - February 4: position paper submission deadline (e-mail to pning@ncsu.edu and mueller@csc.ncsu.edu) - February 22-23: workshop Proceedings: An edited proceeding of this special workshop is planned and will be published by Springer as a participating book in the Advances in Information Security series. The book will consist of contributed papers from each invitee and the papers will be organized under the research themes. Logistics: The meeting is currently scheduled on February 22th and 23th at North Carolina State University, Raleigh, NC. Daily breakfast, lunch and break snack will be provided at the workshop. The meeting is by invitation only.