Workshops
Workshops, Dates, Registration
:
Workshop on Biometrics Chairs: Charlie Frowd, University of Central Lancashire, UK Svetlana Yanushkevich,
University of Calgary, Canada
Workshop on Hardware Security Chair: Radu Andrei, Plura-Tech, USA
Workshop on Computer Vision Chair: Yumi Iwashita, Kyushu University, Japan
Workshop on Artificial Intelligence and Bio-inspired Techiques Chair: Kyrre Glette, Univ. of Oslo, Norway
Workshop on Healthcare and Assisted Living Technologies:Gareth Howells (Chair) and Klaus McDonald-Maier
Workshop on Autonomous Systems and Security Chair: Isabella Panella, Rolls Royce, UK;
Workshop on Digital Forensics Chair:: Antonis Mouhtaropoulos, University of Warwick, UK
Paper Submission:
For paper instructions and submission, please follow the instructions on the submission page
In addition to submission through openconf, a copy should be emailed to the Workshop Chair(s) at the emails listed below
Workshop papers will be reviewed and published in the same way as regular conference papers, however the review will be
led by the Workshop Chair in coordination with the Program Chair.
Workshop on Hardware Security (HardSec) 2013
Chair: Radu Andrei, Plura-Tech, USA
email: radu.andrei@plura-tech.com
Motivations: The proliferation of cryptography modules (both hardware and software components) augments the need for
developing new security features to counter attacks. Securing a cryptographic module is a moving target, for would-be
intruders will benefit from technology advances to the same extent like the “good guys.”
The FIPS 140-2 standard defines four levels of security, simply named "Level 1" to "Level 4". It does not specify in detail
what level of security is required by any particular application. Security Level 4 provides the highest level of security. At this
security level, the physical security mechanisms provide a complete envelope of protection around the cryptographic
module with the intent of detecting and responding to all unauthorized attempts at physical access. Penetration of the
cryptographic module enclosure from any direction has a very high probability of being detected, resulting in the immediate
zeroization of all plaintext Critical Security Parameters (CSPs). Security Level 4 cryptographic modules are useful for
operation in physically unprotected environments. This level also protects a cryptographic module against a security
compromise due to environmental conditions or fluctuations outside of the module's normal operating ranges for voltage
and temperature. Intentional excursions beyond the normal operating ranges may be used by an attacker to thwart a
cryptographic module's defenses. A cryptographic module is required to either include special environmental protection
features designed to detect fluctuations and zeroize CSPs, or to undergo rigorous environmental failure testing to provide a
reasonable assurance that the module will not be affected by fluctuations outside of the normal operating range in a manner
that can compromise the security of the module.
Scope: This workshop aims at bringing together researchers working in this area with the goal of furthering the state-of-
the-art. The submitted papers should address one or several of the following research topics, but should not necessarily be
limited to:
* Recognizing attacks / intrusion attempts * Identifying algorithms for attacks / intrusion attempts * Enhancing protection
against side-channel attacks * Utilizing a cocktail of technologies to enhance defense efficiency * Physical Unclonable
Functions (PUF) * Complementing technologies like mems, mechatronics , etc * PUF-enabled RFID technologies *
New security level testing techniques
Workshop on Digital Forensics
Chair:Antonis Mouhtaropoulos, University of Warwick, UK,
email: a.mouhtaropoulos@warwick.ac.uk
Digital forensics deals with the application of scientific knowledge for collecting, analyzing, and presenting legal evidence.
The most common problem in a digital forensic investigation is that the investigator can only formulate hypothesis on a
component's or artifact's previous state by making indirect observations on the system. The acceptance of a hypothesis
relies on the ability of the investigator to identify, preserve, extract and interpret the data related to the crime.
The workshop will address a wide spectrum of issues including, but not limited to the topics below:
* Anti-forensics * Cloud Computing Forensics *Cyber Crime *Cyber Terrorism *Data Hiding and Recovery
*Digital Evidence *Digital Forensics Tools *Digital Forensics practical case studies, reports and legislative limitations
*Incident Response *Mobile Forensics *Network Forensics *Privacy Issues in Digital Forensics *Social Networking
Forensics
Program Committee
•
Vasilios Katos, Democritus University of Thrace, Greece
•
Chang-Tsun Li, University of Warwick
•
Alex Vakaloudis, Cork Institute of Technology, Ireland
•
Navot Akiva, AGT International, Germany
•
Marthie Grobler, Council of Scientific and Industrial Research, South Africa
Workshop on Computer Vision
Chair: Yumi Iwashita, Kyushu University, Japan
yumi @ ait.kyushu-u.ac.jp
The Workshop on Computer Vision at EST-2013 invites contributions in computer vision and pattern recognition. Topics of
interest include all aspects of computer vision and pattern recognition, including, but not limited to: • Activity recognition •
Aerial image processing • Data mining in video databases • Image processing for access control • Image processing for
surveillance • Object Detection and Categorization • Object Recognition
See first page for deadlines. Workshop papers will be submitted, reviewed, and published in the same way as regular
conference papers.
Workshop on Healthcare and Assisted Living Technologies
Organizers: Gareth Howells (Chair) and Klaus McDonald-Maier
Advances in healthcare and assisted living technologies offer a great potential to improve the delivery of healthcare
services and care environments. This workshop seeks original contributions that broadly fall into the area of healthcare and
assisted living technologies.
Topics
Workshop topics are solicited in all areas relating to healthcare and assisted living, including but not limited to:
o
Assisted living technologies and robotics
o
Architectures for large-scale health information systems, interoperability, and health information exchange
o
Sensors, medical devices and body area networks
o
Home and assisted living monitoring systems
o
Privacy enhancing technologies such as de-identification and differential privacy for electronic health records
generally or specific types of data such as images or genomic data
o
Usability and human factors
o
Ethics, regulatory and policy issues
o
Dependable and trustworthy computing for healthcare and assisted living
o
Telemedicine and mobile health technologies
o
Practical applications and experiences with healthcare technologies
Workshop on Autonomous Systems and Security
Chair: Isabella Panella, Rolls Royce, UK
We invite contributions focusing on architecture and security for autonomous systems capable of independent action in
dynamic, unpredictable environments. Topics of interest include all aspects of autonomous systems and security, such as: •
software architectures • sensor exploitation and localization • situational awareness • decision making and planning •
information management • verification of autonomous systems • model building and learning • system reconfiguration and
adaptation • security mechanisms and solutions for autonomous systems to secure both communications and systems
behavior • IC metrics and template free security system
Workshop on Artificial Intelligence and Bio-inspired Techiques
Chair: Kyrre Glette, Univ. of Oslo, Norway
Systems with different degrees of autonomy of operation benefit greatly from incorporating aspects and mechanisms that
are found in a broad range of biological systems: from survivability and adaptation of the simple living structures to learning,
creativity, cognition and various forms of intelligence that are normally associated with humans. The symposium will bring
together: (a) investigators of bio-inspired and intelligent techniques (more exactly, techniques that increase the machine
intelligence quotient (MIQ), such as, for example, techniques of Artificial Intelligence) and their implementations on high-
performance systems with (b) real-world application developers, project managers, system integrators and end users of
security applications.