Workshops Workshops, Dates, Registration : Workshop on Biometrics Chairs:  Charlie Frowd, University of Central Lancashire, UK Svetlana Yanushkevich, University of Calgary, Canada Workshop on Hardware Security Chair:  Radu Andrei, Plura-Tech, USA Workshop on Computer Vision Chair:  Yumi Iwashita, Kyushu University, Japan Workshop on Artificial Intelligence and Bio-inspired Techiques Chair: Kyrre Glette, Univ. of Oslo, Norway Workshop on Healthcare and Assisted Living Technologies:Gareth Howells (Chair) and Klaus McDonald-Maier  Workshop on Autonomous Systems and Security Chair:  Isabella Panella, Rolls Royce, UK; Workshop on Digital Forensics Chair:: Antonis Mouhtaropoulos, University of Warwick, UK Paper Submission: For paper instructions and submission, please follow the instructions on the submission page  In addition to submission through openconf, a copy should be emailed to the Workshop Chair(s) at the emails listed below   Workshop papers will be reviewed and published in the same way as regular conference papers, however the review will be  led by the Workshop Chair in coordination with the Program Chair.  Workshop on Hardware Security (HardSec) 2013 Chair: Radu Andrei, Plura-Tech, USA  email: radu.andrei@plura-tech.com Motivations:  The proliferation of cryptography modules (both hardware and software components) augments the need for developing new security features to counter attacks. Securing a cryptographic module is a moving target, for would-be intruders will benefit from technology advances to the same extent like the “good guys.” The FIPS 140-2 standard defines four levels of security, simply named "Level 1" to "Level 4". It does not specify in detail what level of security is required by any particular application.  Security Level 4 provides the highest level of security. At this security level, the physical security mechanisms provide a complete envelope of protection around the cryptographic module with the intent of detecting and responding to all unauthorized attempts at physical access. Penetration of the cryptographic module enclosure from any direction has a very high probability of being detected, resulting in the immediate zeroization of all plaintext Critical Security Parameters (CSPs). Security Level 4 cryptographic modules are useful for operation in physically unprotected environments. This level also protects a cryptographic module against a security compromise due to environmental conditions or fluctuations outside of the module's normal operating ranges for voltage and temperature. Intentional excursions beyond the normal operating ranges may be used by an attacker to thwart a cryptographic module's defenses. A cryptographic module is required to either include special environmental protection features designed to detect fluctuations and zeroize CSPs, or to undergo rigorous environmental failure testing to provide a reasonable assurance that the module will not be affected by fluctuations outside of the normal operating range in a manner that can compromise the security of the module. Scope:  This workshop aims at bringing together researchers working in this area with the goal of furthering the state-of- the-art. The submitted papers should address one or several of the following research topics, but should not necessarily be limited to: * Recognizing attacks / intrusion attempts    * Identifying algorithms for attacks / intrusion attempts * Enhancing protection against side-channel attacks  * Utilizing a cocktail of technologies to enhance defense efficiency * Physical Unclonable Functions (PUF)  * Complementing technologies like mems, mechatronics , etc  * PUF-enabled RFID technologies  * New security level testing techniques  Workshop on Digital Forensics Chair:Antonis Mouhtaropoulos, University of Warwick, UK, email:  a.mouhtaropoulos@warwick.ac.uk Digital forensics deals with the application of scientific knowledge for collecting, analyzing, and presenting legal evidence.  The most common problem in a digital forensic investigation is that the investigator can only formulate hypothesis on a  component's or artifact's previous state by making indirect observations on the system. The acceptance of a hypothesis  relies on the ability of the investigator to identify, preserve, extract and interpret the data related to the crime.  The workshop will address a wide spectrum of issues including, but not limited to the topics below:  * Anti-forensics     * Cloud Computing Forensics       *Cyber Crime    *Cyber Terrorism    *Data Hiding and Recovery       *Digital Evidence *Digital Forensics Tools   *Digital Forensics practical case studies, reports and legislative limitations        *Incident Response     *Mobile Forensics     *Network Forensics   *Privacy Issues in Digital Forensics      *Social Networking  Forensics Program Committee Vasilios Katos, Democritus University of Thrace, Greece Chang-Tsun Li, University of Warwick Alex Vakaloudis, Cork Institute of Technology, Ireland Navot Akiva, AGT International, Germany Marthie Grobler, Council of Scientific and Industrial Research, South Africa Workshop on Computer Vision Chair:  Yumi Iwashita, Kyushu University, Japan yumi @ ait.kyushu-u.ac.jp The Workshop on Computer Vision at EST-2013 invites contributions in computer vision and pattern recognition. Topics of interest include all aspects of computer vision and pattern recognition, including, but not limited to:  • Activity recognition • Aerial image processing • Data mining in video databases • Image processing for access control • Image processing for surveillance • Object Detection and Categorization • Object Recognition See first page for deadlines.   Workshop papers will be submitted, reviewed, and published in the same way as regular conference papers.                                           Workshop on Healthcare and Assisted Living Technologies                                          Organizers: Gareth Howells (Chair) and Klaus McDonald-Maier Advances in healthcare and assisted living technologies offer a great potential to improve the delivery of healthcare services and care environments. This workshop seeks original contributions that broadly fall into the area of healthcare and assisted living technologies. Topics Workshop topics are solicited in all areas relating to healthcare and assisted living, including but not limited to: o Assisted living technologies and robotics o Architectures for large-scale health information systems, interoperability, and health information exchange o Sensors, medical devices and body area networks o Home and assisted living monitoring systems o Privacy enhancing technologies such as de-identification and differential privacy for electronic health records generally or specific types of data such as images or genomic data o Usability and human factors o Ethics, regulatory and policy issues o Dependable and trustworthy computing for healthcare and assisted living o Telemedicine and mobile health technologies o Practical applications and experiences with healthcare technologies Workshop on Autonomous Systems and Security Chair:   Isabella Panella, Rolls Royce, UK We invite contributions focusing on architecture and security for autonomous systems capable of independent action in dynamic, unpredictable environments.  Topics of interest include all aspects of autonomous systems and security, such as: • software architectures • sensor exploitation and localization • situational awareness • decision making and planning • information management • verification of autonomous systems • model building and learning • system  reconfiguration and adaptation • security mechanisms and solutions for autonomous systems to secure both communications and systems behavior • IC metrics and template free security system Workshop on Artificial Intelligence and Bio-inspired Techiques Chair: Kyrre Glette, Univ. of Oslo, Norway Systems with different degrees of autonomy of operation benefit greatly from incorporating aspects and mechanisms that are found in a broad range of biological systems: from survivability and adaptation of the simple living structures to learning, creativity, cognition and various forms of intelligence that are normally associated with humans.  The symposium will bring together: (a) investigators of bio-inspired and intelligent techniques (more exactly, techniques that increase the machine intelligence quotient (MIQ), such as, for example, techniques of Artificial Intelligence) and their implementations on high- performance systems with (b) real-world application developers, project managers, system integrators and end users of security applications.