Preface
Technological advances have led to wide deployment and use of embedded systems in an increasing range of applications, from mobile phones to car, plane and spacecraft and from digital id's to military systems in the field. Many of these applications place significant security requirements and have led to significant research activity in the area of security and embedded systems, due to the limited resources of conventional embedded systems. This emerging research area is of great importance to a large number of public and private organizations, due to their desire to deploy secure embedded systems in the field.
The NATO Advanced Research Workshop on “Security and Embedded Systems” constitutes one of the first international efforts to emphasize the importance of this emerging technical field and to provide a forum for presentations and participation of leading researchers in the field. Its objectives were to present the technologies and open problems of the emerging area of security and embedded systems, to present the latest research results in all aspects of security in embedded systems, and, finally, to provide a roadmap of the technology for the future. Considering the main directions of research in the field, we organized the workshop in 3 main areas: (i) foundations of security and embedded systems, (ii) secure embedded computing systems and (iii) telecommunications and network services. The program included 23 papers, covering all main areas with strong research and tutorial contributions from a wide range of participants from industry and academia. In these proceedings, we include all papers by the contributors to the workshop.
We thank the members of the Organizing Committee of the workshop: J. Dockal (University of Defence, Czech Republic), V. Gorodetsky (Russian Academy of Sciences, Russia), J. Henkel (University of Karlsruhe, Germany) and W. Wolf (Princeton University, USA). Their contributions and participation in this effort as well as their experience have led to a very successful program for the workshop, which was enjoyed by all participants. Finally, we thank Mr. Kyriakos Stefanidis for his invaluable help and support in the organization of the workshop.
Based on the results of the workshop and the interest of the attendants, we strongly believe that this effort should be followed up by additional workshops and conferences in the future, focusing on security and embedded systems.
D.N. Serpanos, University of Patras, Greece; R. Giladi, Ben Gurion University, Israel