Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3338499acmconferencesBook PagePublication PagesccsConference Proceedingsconference-collections
CPS-SPC'19: Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy
ACM2019 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security London United Kingdom 11 November 2019
ISBN:
978-1-4503-6831-5
Published:
11 November 2019
Sponsors:
Next Conference
October 14 - 18, 2024
Salt Lake City , UT , USA
Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the Fifth ACM Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC) in conjunction with the 26th ACM Conference on Computer and Communications Security (CCS) in London, United Kingdom.

Our increased dependency on cyber-physical systems (CPS) has amplified concerns of cyber attacks on these systems. These transformative attack methods require additional research into secure control systems and related architectures of CPS. The majority of the published literature addressing the security and privacy of CPS reflect a field that is still developing. As such, the overall principles, models, and theories for securing CPS have not yet emerged. The CPS-SPC workshop series provides a focal point for the research community to begin addressing the security and privacy of CPS in a comprehensive and interdisciplinary manner and, in tandem with other efforts, build a comprehensive research roadmap. As a workshop, we expect to attract papers that reflect new research directions in CPS security and privacy as well as early results based on "works in progress".

This year's workshop builds on the foundation laid last year to become one of the premier forums for presentation of interdisciplinary research results and experience reports at the interface of control theory, information security, embedded and real-time systems and human factors applied to CPS. The mission of the workshop is to create a community of researchers focusing on diverse aspects of CPS Security and Privacy, and to provide researchers and practitioners a premier forum to share their perspectives with others interested in interdisciplinary approaches to solve the challenging security and privacy problems in CPS.

Skip Table Of Content Section
SESSION: Session 1: Keynote
keynote
Network Monitoring of Industrial Control Systems: The Lessons of SecurityMatters

Established in 2009 in the Netherlands as a University spin-off by a professor and two PhD students, SecurityMatters was acquired in 2018 by the American ForeScout Technologies Inc. (NASDAQ:FCST). Security Matters was the pioneer of a new way of ...

SESSION: Session 2: Industrial Control Systems
research-article
Security Analysis of Radar Systems

Radar systems are used to detect the existence, location, and trajectory of objects in space using electromagnetic waves.They are mainly used for tracking aircraft, missiles, satellites, and watercraft. In recent years, as technology has evolved, the ...

research-article
Open Access
Enhancing the Resiliency of Cyber-Physical Systems with Software-Defined Networks

Numerous research efforts have focused on intrusion detection in industrial control networks, however, few of them discuss what to do after an intrusion has been detected. Because the safety of most of these control systems is time-sensitive, we need ...

research-article
Dataflow Challenges in an Internet of Production: A Security & Privacy Perspective

The Internet of Production (IoP) envisions the interconnection of previously isolated CPS in the area of manufacturing across institutional boundaries to realize benefits such as increased profit margins and product quality as well as reduced product ...

SESSION: Session 3: Intrusion Detection and Prevention
research-article
CopyCAN: An Error-Handling Protocol based Intrusion Detection System for Controller Area Network

In the last years, the automotive industry has incorporated more and more electronic components in vehicles, leading to complex on-board networks of Electronic Control Units (ECUs) that communicate with each other to control all vehicle functions, ...

research-article
Characterizing Background Noise in ICS Traffic Through a Set of Low Interaction Honeypots

Industrial Control Systems (ICS) are nowadays interconnected with various networks and, ultimately, with the Internet. Due to this exposure, malicious actors are interested into compromising ICS - not only for advanced and targeted attacks, but also in ...

research-article
Public Access
Controller Area Network Intrusion Prevention System Leveraging Fault Recovery

The ever-increasing demand for safety, comfort, and automation in the automobile has increased their vulnerability to cybersecurity risk and attacks. Automobiles now embed several electronic devices to perform these functions, and the complexity in the ...

SESSION: Session 4: Physical Layer and Testbeds
research-article
Oops I Did it Again: Further Adventures in the Land of ICS Security Testbeds

Research efforts in the security of Industrial Control Systems (ICS) have dramatically increased over the past few years. However, there is a limiting factor when work cannot be evaluated on real-world systems due to safety and operational reasons. This ...

research-article
The Leaky Actuator: A Provably-covert Channel in Cyber Physical Systems

Strict regulations and security practices of critical cyber-physical systems, such as nuclear plants, require complete isolation between their data-acquisition zone and their safety and security zones. Isolation methods range from firewall devices, to '...

research-article
Security Implications of Implementing Multistate Distance-Bounding Protocols

A number of distance-bounding protocols have proposed multistate exchanges. In theory this can potentially improve the security of the protocol when using the same number of exchange rounds, i.e. as there are more than two states the probability of an ...

Contributors
  • University College London
  • Ludwig-Maximilians-University Munich
  • CISPA - Helmholtz Center for Information Security
  1. Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy

      Recommendations

      Acceptance Rates

      Overall Acceptance Rate53of66submissions,80%
      YearSubmittedAcceptedRate
      CPS-SPC '181022220%
      CPS '1710880%
      CPS-SPC '16261246%
      CPS-SPC '15201155%
      Overall665380%