Workshop on

Research Directions for Security and Networking in

Critical Real-Time and Embedded Systems

 

http://moss.csc.ncsu.edu/~mueller/crtes06
April 4, 2006, San Jose, California, USA

In conjunction with RTAS'06

CFP as PDF and text

 

The objective of this workshop is to identify research problems related to security and networking of real-time/embedded systems deployed as control systems for critical infrastructure and as mission-critical systems.

Scientific principles, disciplined engineering methodologies, and well-defined formulations on system problems have helped the IT industry to produce some of the most celebrated technologies in the past two decades. As we see various technologies penetrate into every aspect of our daily life, new issues and ever greater challenges begin to emerge.  Cybersecurity and networking are on top of the list of grand technology challenges that will have profound impact on the quality of information services to be delivered to the whole society.  In particular, embedded systems and real-time systems are widely used in today's society. Critical infrastructure, such as the power grid, power plants, telephone and the Internet itself, rely on such systems, just as safety-critical systems (planes, cars) and mission-critical systems (e.g., UAVs) do. Such control systems are increasingly being connected to the Internet to facilitate maintenance and reduce the cost of monitoring. Another trend is to increasingly rely on sensor networks to provide input to these control systems via wireless communication. However, the increasing connectivity of these real-time/embedded systems to general computing services poses a significant threat as they become exposed to potentially harmful attacks. Cybersecurity and networking concerns must be considered to counter these risks.

This workshop aims to identify these risks at a technical level. Its objective is to determine the needs of current and future critical systems and their integration into existing computing infrastructure. The forum's purpose is to bring together researchers, practitioners and partners from funding agencies to identify grand challenges in this domain. Its intent is to initiate medium to long-term projects addressing fundamentally novel approaches instead of short-term, retrofitted solutions. The workshop results will be compiled in a document to support agencies in their task to request funds for research in this area.

 

Problems of interest (topics) for this workshop include, but are not limited to:

 

Logistics:

 

For registration (early rate cut-off: March 8) and hotel information (special rate cut-off: March 4), see RTAS'06.


 

Workshop Program + Slides:

 

8:00-8:30 breakfast and registration

 

8:30-9:10 “Square Wheels and Round Tuits”, Steve Bellovin (Columbia U.)

9:10-9:20 “Trustworthy Cyber-Infrastructure for Power”, C. Gunter, D. Bakken, A. Bose, R. Campbell, G. Gross, C. Hauser, H. Khurana,

R. Iyer, Z. Kalbarczyk, K. Nahrstedt, D. Nicol , T. Overbye, P. Sauer, S. Smith,

R. Thomas, V. Welch, M. Winslett (UIUC, WSU, NCSA, Dartmouth, Cornell)

9:20-9:30 “”Making Real-time Systems Survive Malicious Attacks”, P. Pal, L. Loyall, F. Webber, R. Schantz (BNN)

 

9:30-10:00 coffee break

 

10:00-10:40 “On Securing Networked Real-Time Embedded Systems”, Kang Shin (Michigan U.)

10:40-10:50 “Engineering the Advanced Power Grid: Research Challenges and Tasks”, M. Crow, C. Gill, F. Liu, B. McMillin,

 D. Niehaus, D. Tauritz (U. Missouri, Washington U., U. Kansas)

10:50-11:00 “Integrating Security Modeling in Embedded System Design”, J. Werner, M. Eby, J. Janos, G. Karsai, Y. Xue, J. Sztipanovits (Vanderbilt U.)

 

11:00-11:30 break

 

11:30-12:10 “Real Time GENI: An informal Preview”, Lui Sha (UIUC)

12:10-12:20 “Critical Utility Infrastructure Resilience”, G. Dondossola, G. Deconinck, F. Di Giandomenico, S. Donatelli,

 M. Kaaniche, P. Verissimo (CESI Italy, NUL Berlgium, CNR-ISTI Italy, CNIT Italy, LAAS-NCRS France, FCUL Portugal)

12:20-12:30 “Coordination of Safety-Critical Mobile Real-Time Embedded Systems”, A. Senart, M. Bouroche, B. Hughes, V. Cahill (Trinity College, Ireland)

 

12:30-2:00 lunch

 

2:00-3:00 panel & round table discussion: Helen Gill (NSF), Daniel Mossé (U Pittsburgh), Michael Oehler (DoD), Al Valdes (SRI International), Carl Gunter (UIUC)

 

3:00-3:30 break

 

3:30-4:30 break-out sessions

 

4:30-5:00 break

 

5:00-6:00 summary & round table discussion

 


Online Proceedings:

 

. “Trustworthy Cyber-Infrastructure for Power”, C. Gunter, D. Bakken, A. Bose, R. Campbell, G. Gross, C. Hauser, H. Khurana,

R. Iyer, Z. Kalbarczyk, K. Nahrstedt, D. Nicol , T. Overbye, P. Sauer, S. Smith,

R. Thomas, V. Welch, M. Winslett (UIUC, WSU, NCSA, Dartmouth, Cornell)

. ”Making Real-time Systems Survive Malicious Attacks”, P. Pal, L. Loyall, F. Webber, R. Schantz (BNN)

. “Engineering the Advanced Power Grid: Research Challenges and Tasks”, M. Crow, C. Gill, F. Liu, B. McMillin,

D. Niehaus, D. Tauritz (U. Missouri, Washington U., U. Kansas)

. “Integrating Security Modeling in Embedded System Design”, J. Werner, M. Eby, J. Janos, G. Karsai, Y. Xue, J. Sztipanovits (Vanderbilt U.)

. “Critical Utility Infrastructure Resilience”, G. Dondossola, G. Deconinck, F. Di Giandomenico, S. Donatelli,

M. Kaaniche, P. Verissimo (CESI Italy, NUL Berlgium, CNR-ISTI Italy, CNIT Italy, LAAS-NCRS France, FCUL Portugal)

. “Coordination of Safety-Critical Mobile Real-Time Embedded Systems”, A. Senart, M. Bouroche, B. Hughes, V. Cahill (Trinity College, Ireland)

. “Proposal for the Development of Models of Cyber Security with Application to the Electric Grid”, N. Schneidewind (Naval Postgraduate School)

. “Embedded System Certification under a Software Engineering Perspective”, L. Pazzi (U. of Modena and Reggio Emilia, Italy)

. “Challenges of Wireless Control in Process Indusrty”, J. Song, A. Mok, D. Chen, M. Nixon (U. Texas at Austin, Emerson Process Management)

. “On-Time and Scalable Intrusion Detection in Embedded Systems”, A. Cheng (U. Houston)

. “Challenges in Continuous Sensing from Heterogeneous Metadata Sources”, A. Doboli (SUNY Stony Brook)

. “Building System Immunity in Real Time”, A. Tsvetkovski (Boston U.)

                                                                                                           

 

 


Submission:

Authors are invited to submit position papers describing grand challenges (not their solutions) and new research directions to crtes06@csc.ncsu.edu. Submissions are restricted to 2 pages. A selection of these submissions will be considered for presentation during the workshop.  Electronic submissions are mandatory.  Submissions should be e-mailed to one of the workshop organizers.  Preferred formats are PDF or PostScript.

 

Important Dates:

Submission Deadline: Feb 24, 2006 at midnight EDT

Notification: Mar 13, 2006

Camera-ready: Mar 20, 2006

Organizers:

Frank Mueller (NC State University)

Peng Ning (NC State University)

Kevin Jeffay (UNC Chapel Hill)

Keynotes:

Steve Bellovin (Columbia U.)

Kang Shin (Michigan)

Lui Sha (UIUC)

Panelists:

Helen Gill (NSF)

Karl Levitt (NSF)

Daniel Mossé (U Pittsburgh)

Michael Oehler (DoD)

Al Valdes (SRI International)

Wayne Wolf (Princeton)

Advisory Committee:

Steve Bellovin (Columbia U.)

Cathy Gebotys (Waterloo)

Helen Gill (NSF)

Karl Levitt (NSF)

Al Mok (UT Austin)

Daniel Mossé (U Pittsburgh)

Michael Oehler (DoD)

Adrian Perrig (CMU)

Radha Poovendran (UW)

Raj Rajkumar (CMU)

Srivaths Ravi (NEC)

Lui Sha (UIUC)

Kang Shin (Michigan)

Sang Son (UVA)

Eugene Spafford (Purdue)

John Stankovic (UVA)

Janos Sztipanovits (Vanderbilt)

Gene Tsudik  (UC Irvine)

Al Valdes (SRI International)

Cliff Wang (DARPA)

Wayne Wolf (Princeton)