CTU
IEEE
PESW 2017
The 5th Prague Embedded Systems Workshop
June 29-30, 2017
Roztoky u Prahy, Czech Republic

Keynotes

Traffic Mining, feel the packets, be the packets

Speaker: Stefan Burschka, Ruag Defence AG, Switzerland

The talk will supply an insight into the practice of Infrastructure Troubleshooting and Encrypted Traffic Mining with regard to the danger of today's trust in tools instead of decent human knowledge. It will teach the audience the potential of the human brain and the importance of proper preprocessing when dealing with large datasets e.g. > 20 Tbyte. Which finally motivates the development of the open souce tool Tranalyzer, the so called Anteater. Automated pre- and post processing of the new "Boeing" version 0.707 for Mining and Forensics geeks will be shortly discussed.
Stefan Burschka
Formation: Physics and Microwave Engineering
Area of interest: General Relativity, Quantum Optics, Datamining, Robotics and AI.
After a long industrial engineering career in HW/SW development, Datamining and IP-Security jobs, he now leads the Traffic Mining group @ Ruag Defence AG in Bern Switzerland. He works with his team on network troubleshooting and IP traffic mining and forensics and is the lead developer of the open source tool Tranalyzer aka The Anteater.

Cyber-physical systems - History, Challenges and Expectations

Speaker: Ilya Levin, Tel-Aviv University, Israel

Cyber-physical systems (CPS) are hybrid systems constructed by using both digital and analog components. CPS functioning comprise intensive communication with physical world around us. CPS is not just a technological entity but also a significant cultural and even social phenomenon of coming Digital Age. The emergence and wide distribution of CPS is a significant step ahead in human progress. The design, construction and verification of cyber-physical systems pose a multitude of technical challenges that must be addressed by a cross-disciplinary community of researchers and educators.

IoT Security and Trust Challenges

Speaker: Giorgio Di Natale, LIRMM, Montpellier, France

Internet of Things will soon connect billions of devices, leading to an increasing number of security challenges. To improve security, an IoT device should have strict rules to access the network (including authentication and trust). However, security experts have warned of the potential risk of large numbers of unsecured devices connected to the Internet. Indeed, these objects will reach a sufficient lifetime to become vulnerable to attacks that are not known at the design time. This talk will address the new security and trust challenges in IoT and it will sketch some research directions to overcome these problems.