Call for Papers

Scope

With increasing use of software systems together with commodity hardware comes the need for better quality control techniques. However, there is a gap when considering separate domains like hardware and software and their interactions which usually tend to be forgotten or neglected as reserach ends up working in only one of the areas. Ignoring these interactions is no longer possible in the context of generalized usage of Cyber Physical Systems (CPSs) and Cyber Physical Systems of Systems (CPSoSs). Thus, it becomes urgent to deal with faulty and malicious hardware/software interactions.

The challenge in analyzing faulty hardware-software interactions is caused by research and development activities that have, over time, evolved into two separate directions, namely FEF (Faults, Errors, Failures) analysis of hardware resources and FEF analysis of software components. Analysis of faulty hardware-software interactions can prevent deployment of future platforms (combination of hardware resources and software components) likely to contain faulty behavior, with a major impact on the users and fixing costs.

Topics of Interest

The main theme is identification and reporting on malicious and faulty hardware-software interactions of systems, especially in the context of Cyber Physical Systems. The workshop has multiple topics of interest but not restricted to:

  • Fault diagnosis, analysis, detection and prediction. Especially at the borders of hardware and software.
  • Fault tolerance and resilience of hardware and software systems.
  • Tools and automation for analysis of hardware – software interactions.
  • Dynamic software upgrades in Cyber-Physical Systems (not restricted):
      • Development of methods for detecting faulty hardware-software interactions.
      • Development of architectures that mitigate the risks of faulty components (combination of hardware and software) due to malicious or faulty software.
      • Compatibility predictions of hardware-software integration. How a system should monitor and detect introduction of new hardware or software components.
      • Development of methods that enable discovering of malicious behavior of software components in interaction with virtual entities in a simulated environment.

Paper Categories

We welcome relevant contributions in the following forms:

  • Ongoing research papers presenting promising work in progress with at least some preliminary results in related topics (up to 6 pages).

Submission

Authors are invited to submit high quality unpublished research work describing the results of theoretical and experimental research in identification and reporting on malicious and faulty hardware-software interactions of systems, in the context of Cyber Physical Systems. All the accepted papers will be included in the IEEE Xplore Digital Library.

Papers must be written in English and be formatted according to the IEEE authoring guidelines.