Aligned with
This conference contributes to global sustainability by aligning its research discussions and academic sessions with key United Nations Sustainable Development Goals. It fosters knowledge exchange, innovation, and collaborative engagement.
SDG 9 — Industry, Innovation and Infrastructure
SDG 11 — Sustainable Cities and Communities
SDG 16 — Peace, Justice and Strong Institutions
This track focuses on the latest innovations in securing embedded systems against evolving threats. Researchers are invited to present novel methodologies and technologies that enhance the security posture of embedded devices.
This session addresses the unique security challenges posed by the Internet of Things. Contributions should explore effective strategies for securing IoT devices and networks from various attack vectors.
This track examines techniques for safeguarding firmware in embedded systems. Papers should discuss approaches to prevent unauthorized access and modifications to firmware, ensuring system integrity.
This session delves into hardware-based security solutions for embedded systems. Topics may include secure hardware design, physical unclonable functions, and countermeasures against hardware attacks.
This track focuses on the development and evaluation of intrusion detection systems tailored for cyber-physical systems. Researchers are encouraged to present innovative detection algorithms and their effectiveness in real-world scenarios.
This session emphasizes methodologies for threat analysis and risk assessment in embedded systems. Contributions should provide insights into identifying vulnerabilities and implementing risk management strategies.
This track highlights the importance of secure coding practices in the development of embedded applications. Papers should discuss coding standards, tools, and techniques that mitigate security vulnerabilities.
This session focuses on methodologies for assessing vulnerabilities in embedded systems. Researchers are invited to present case studies and tools that facilitate comprehensive vulnerability analysis.
This track explores real-time security mechanisms for embedded systems that require immediate threat response. Contributions should address the challenges of implementing security without compromising system performance.
This session investigates methods for ensuring system integrity and establishing trust in embedded devices. Papers should explore techniques for attestation, secure boot, and integrity verification.
This track examines access control strategies tailored for embedded systems. Contributions should discuss models, frameworks, and implementations that enhance access control and user authentication.
SNRI maintains uninterrupted academic processes in the current global situation. Participants can engage and publish through online and blended conference formats.
PLEASE READ: CLOSING ENABLED IN 20S