TOP
Search the Dagstuhl Website
Looking for information on the websites of the individual seminars? - Then please:
Not found what you are looking for? - Some of our services have separate websites, each with its own search option. Please check the following list:
Schloss Dagstuhl - LZI - Logo
Schloss Dagstuhl Services
Seminars
Within this website:
External resources:
  • DOOR (for registering your stay at Dagstuhl)
  • DOSA (for proposing future Dagstuhl Seminars or Dagstuhl Perspectives Workshops)
Publishing
Within this website:
External resources:
dblp
Within this website:
External resources:
  • the dblp Computer Science Bibliography


Research Meeting 26144

Security at the Intersection of Embedded Systems and Machine Learning

( Mar 30 – Apr 01, 2026 )

Permalink
Please use the following short url to reference this page: https://www.dagstuhl.de/26144

Organizers

Contact

Description

Modern computing systems face security challenges that span multiple layers of abstraction, from hardware and firmware in embedded devices to the machine learning models that increasingly govern their behavior. As embedded systems become more intelligent and ML models are deployed in safety-critical environments such as autonomous vehicles, satellite systems, and industrial control, the attack surface grows in complexity. Adversarial manipulation of ML inputs, firmware-level vulnerabilities, and side-channel leakage each represent significant threats individually, yet their intersection remains underexplored.

This seminar brings together researchers from the Embedded Systems Security (EMSEC) and Adversarial Machine Learning groups at CISPA Helmholtz Center for Information Security to explore this intersection. Topics include the robustness of ML models deployed on embedded platforms, firmware security for systems that rely on learned components, adversarial attacks on sensor inputs and communication protocols, and the development of defensive mechanisms that account for both system-level and model-level threats. The seminar aims to identify new collaborative research directions and produce a shared roadmap for securing intelligent embedded systems.

Copyright Ali Abbasi and Lea Schönherr