http://moss.csc.ncsu.edu/~mueller/crtes06
April 4, 2006, San Jose, California, USA
In conjunction with RTAS'06
The
objective of this workshop is to identify research problems related to security
and networking of real-time/embedded systems deployed as control systems for
critical infrastructure and as mission-critical systems.
Scientific principles, disciplined
engineering methodologies, and well-defined formulations on system problems
have helped the IT industry to produce some of the most celebrated technologies
in the past two decades. As we see various technologies penetrate into every
aspect of our daily life, new issues and ever greater challenges begin to
emerge. Cybersecurity and networking
are on top of the list of grand technology challenges that will have profound
impact on the quality of information services to be delivered to the whole
society. In particular, embedded
systems and real-time systems are widely used in today's society. Critical
infrastructure, such as the power grid, power plants, telephone and the
Internet itself, rely on such systems, just as safety-critical systems (planes,
cars) and mission-critical systems (e.g., UAVs) do. Such control systems are
increasingly being connected to the Internet to facilitate maintenance and
reduce the cost of monitoring. Another trend is to increasingly rely on sensor
networks to provide input to these control systems via wireless communication.
However, the increasing connectivity of these real-time/embedded systems to
general computing services poses a significant threat as they become exposed to
potentially harmful attacks. Cybersecurity and networking concerns must be
considered to counter these risks.
This workshop aims to identify these risks at
a technical level. Its objective is to determine the needs of current and
future critical systems and their integration into existing computing
infrastructure. The forum's purpose is to bring together researchers,
practitioners and partners from funding agencies to identify grand challenges
in this domain. Its intent is to initiate medium to long-term projects
addressing fundamentally novel approaches instead of short-term, retrofitted
solutions. The workshop results will be compiled in a document to support
agencies in their task to request funds for research in this area.
Problems of interest (topics) for this workshop include, but are not
limited to:
Logistics:
For registration
(early rate cut-off: March 8) and hotel information (special rate cut-off:
March 4), see RTAS'06.
Workshop Program + Slides:
8:00-8:30 breakfast and registration
8:30-9:10 “Square
Wheels and Round Tuits”, Steve Bellovin (Columbia U.)
9:10-9:20 “Trustworthy Cyber-Infrastructure for
Power”, C. Gunter, D.
Bakken, A. Bose, R. Campbell, G. Gross, C. Hauser, H. Khurana,
R. Iyer, Z.
Kalbarczyk, K. Nahrstedt, D. Nicol , T. Overbye, P. Sauer, S. Smith,
R. Thomas, V.
Welch, M. Winslett (UIUC, WSU, NCSA, Dartmouth, Cornell)
9:20-9:30 “”Making
Real-time Systems Survive Malicious Attacks”, P. Pal, L. Loyall, F. Webber,
R. Schantz (BNN)
9:30-10:00 coffee break
10:00-10:40 “On
Securing Networked Real-Time Embedded Systems”, Kang Shin (Michigan U.)
10:40-10:50 “Engineering
the Advanced Power Grid: Research Challenges and Tasks”, M. Crow, C. Gill,
F. Liu, B. McMillin,
D.
Niehaus, D. Tauritz (U. Missouri, Washington U., U. Kansas)
10:50-11:00 “Integrating
Security Modeling in Embedded System Design”, J. Werner, M. Eby, J. Janos,
G. Karsai, Y. Xue, J. Sztipanovits (Vanderbilt U.)
11:00-11:30 break
11:30-12:10 “Real
Time GENI: An informal Preview”, Lui Sha (UIUC)
12:10-12:20 “Critical
Utility Infrastructure Resilience”, G. Dondossola, G. Deconinck, F. Di
Giandomenico, S. Donatelli,
M. Kaaniche, P. Verissimo (CESI Italy, NUL
Berlgium, CNR-ISTI Italy, CNIT Italy, LAAS-NCRS France, FCUL Portugal)
12:20-12:30 “Coordination
of Safety-Critical Mobile Real-Time Embedded Systems”, A. Senart, M.
Bouroche, B. Hughes, V. Cahill (Trinity College, Ireland)
12:30-2:00 lunch
2:00-3:00 panel
& round table discussion: Helen
Gill (NSF), Daniel
Mossé (U Pittsburgh), Michael
Oehler (DoD), Al
Valdes (SRI International), Carl
Gunter (UIUC)
3:00-3:30 break
3:30-4:30 break-out sessions
4:30-5:00 break
5:00-6:00 summary
& round table discussion
Online Proceedings:
. “Trustworthy
Cyber-Infrastructure for Power”, C. Gunter, D. Bakken, A. Bose, R.
Campbell, G. Gross, C. Hauser, H. Khurana,
R. Iyer, Z. Kalbarczyk, K. Nahrstedt, D.
Nicol , T. Overbye, P. Sauer, S. Smith,
R.
Thomas, V. Welch, M. Winslett (UIUC, WSU, NCSA, Dartmouth, Cornell)
. ”Making
Real-time Systems Survive Malicious Attacks”, P. Pal, L. Loyall, F. Webber,
R. Schantz (BNN)
. “Engineering
the Advanced Power Grid: Research Challenges and Tasks”, M. Crow, C. Gill,
F. Liu, B. McMillin,
D.
Niehaus, D. Tauritz (U. Missouri, Washington U., U. Kansas)
. “Integrating
Security Modeling in Embedded System Design”, J. Werner, M. Eby, J. Janos,
G. Karsai, Y. Xue, J. Sztipanovits (Vanderbilt U.)
. “Critical Utility Infrastructure
Resilience”, G. Dondossola, G. Deconinck, F. Di Giandomenico, S.
Donatelli,
M. Kaaniche, P. Verissimo (CESI Italy, NUL Berlgium, CNR-ISTI Italy, CNIT Italy, LAAS-NCRS France, FCUL Portugal)
. “Coordination
of Safety-Critical Mobile Real-Time Embedded Systems”, A. Senart, M.
Bouroche, B. Hughes, V. Cahill (Trinity College, Ireland)
. “Proposal
for the Development of Models of Cyber Security with Application to the
Electric Grid”, N. Schneidewind (Naval Postgraduate School)
. “Embedded
System Certification under a Software Engineering Perspective”, L. Pazzi
(U. of Modena and Reggio Emilia, Italy)
. “Challenges
of Wireless Control in Process Indusrty”, J. Song, A. Mok, D. Chen, M.
Nixon (U. Texas at Austin, Emerson Process Management)
. “On-Time
and Scalable Intrusion Detection in Embedded Systems”, A. Cheng (U.
Houston)
. “Challenges
in Continuous Sensing from Heterogeneous Metadata Sources”, A. Doboli (SUNY
Stony Brook)
. “Building
System Immunity in Real Time”, A. Tsvetkovski (Boston U.)
Submission:
Authors are invited
to submit position papers describing grand challenges (not their solutions) and
new research directions to crtes06@csc.ncsu.edu.
Submissions are restricted to 2 pages. A
selection of these submissions will be considered for presentation during the
workshop. Electronic submissions are
mandatory. Submissions should be
e-mailed to one of the workshop organizers.
Preferred formats are PDF or PostScript.
Important Dates:
Submission Deadline: Feb 24, 2006 at midnight
EDT
Notification:
Mar 13, 2006
Camera-ready:
Mar 20, 2006
Organizers:
Frank Mueller (NC State University)
Peng Ning (NC State University)
Kevin Jeffay (UNC Chapel Hill)
Keynotes:
Steve Bellovin (Columbia U.)
Kang Shin (Michigan)
Lui Sha (UIUC)
Panelists:
Helen Gill (NSF)
Karl Levitt (NSF)
Daniel Mossé (U
Pittsburgh)
Michael Oehler (DoD)
Al Valdes (SRI International)
Wayne Wolf (Princeton)
Advisory Committee:
Steve Bellovin (Columbia U.)
Cathy Gebotys (Waterloo)
Helen Gill (NSF)
Karl Levitt (NSF)
Al Mok (UT Austin)
Daniel Mossé (U Pittsburgh)
Michael Oehler (DoD)
Adrian Perrig (CMU)
Radha Poovendran (UW)
Raj Rajkumar (CMU)
Srivaths Ravi (NEC)
Lui Sha (UIUC)
Kang Shin (Michigan)
Sang Son
(UVA)
Eugene
Spafford (Purdue)
John
Stankovic (UVA)
Janos
Sztipanovits (Vanderbilt)
Gene
Tsudik (UC Irvine)
Al Valdes
(SRI International)
Cliff Wang
(DARPA)
Wayne Wolf (Princeton)