skip to main content
10.1145/2808705acmconferencesBook PagePublication PagesccsConference Proceedingsconference-collections
CPS-SPC '15: Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy
ACM2015 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CCS'15: The 22nd ACM Conference on Computer and Communications Security Denver Colorado USA 16 October 2015
ISBN:
978-1-4503-3827-1
Published:
16 October 2015
Sponsors:
Next Conference
October 14 - 18, 2024
Salt Lake City , UT , USA
Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the First ACM Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC) in conjunction with the 22nd ACM Conference on Computer and Communications Security in Denver, Colorado, USA.

Our increased dependency on cyber-physical systems (CPS) has amplified concerns of cyber attacks on these systems. These transformative attack methods require additional research into secure control systems and related architectures of CPS. The majority of the published literature addressing the security and privacy of CPS reflect a field still in its infancy; as such, the overall principles, models, and theories for securing CPS have not yet emerged. It is hoped that this workshop will provide a focal point for the research community to begin addressing the security and privacy of CPS in a comprehensive and multidisciplinary manner and, in tandem with other efforts, build a comprehensive research roadmap. As a workshop, we expect to attract papers that reflect ongoing work that are still "works in progress".

This first edition of the workshop aims to lay the foundations to become one of the premier forums for presentation of interdisciplinary research results and experience reports at the interface of control theory, information security, embedded and real-time systems and human factors applied to CPS. The mission of the workshop is to create a community of researchers focusing on diverse aspects of CPS Security and Privacy, and to provide researchers and practitioners a premiere forum to share their perspectives with others interested in interdisciplinary approaches to solve the challenging security and privacy problems in CPS.

We received 20 submissions, and all papers were reviewed by at least three program committee members. 11 papers were accepted leading to a 55% acceptance rate.

Skip Table Of Content Section
SESSION: Miscellaneous
research-article
On Passive Data Link Layer Fingerprinting of Aircraft Transponders

In order to meet future demands in increasingly congested airspaces, the world's aviation authorities are currently upgrading their air-traffic management systems. The Automatic Dependent Surveillance-Broadcast (ADS-B) protocol is at the core of the ...

research-article
Public Access
Eliminating Inter-Domain Vulnerabilities in Cyber-Physical Systems: An Analysis Contracts Approach

Designing secure cyber-physical systems (CPS) is a particularly difficult task since security vulnerabilities stem not only from traditional cybersecurity concerns, but also physical ones. Many of the standard methods for CPS design make strong and ...

research-article
The Impact of Social Engineering on Industrial Control System Security

In assessing the security posture of Industrial Control Systems (ICS), several approaches have been proposed, including attack graphs, attack trees, Bayesian networks and security ideals. Predominantly focusing on technical vulnerabilities, challenges ...

SESSION: Control and Theoretical Foundations
research-article
Secure and Resilient Control Design for Cloud Enabled Networked Control Systems

Cloud computing enables resource-constrained Networked Control Systems (NCSs) to outsource heavy computations to a cloud server with massive computational resources. However, Cloud-enabled NCSs (CE-NCSs) introduce new challenges arising from the ...

research-article
Attack Mitigation in Adversarial Platooning Using Detection-Based Sliding Mode Control

In this paper, we consider a mitigation strategy to prevent a vehicle controlled by an attacker from causing collisions in a vehicular platoon. An adversarial-aware control scheme, based on sliding mode control using only local sensor information and a ...

research-article
Public Access
Scheduling Intrusion Detection Systems in Resource-Bounded Cyber-Physical Systems

In order to be resilient to attacks, a cyber-physical system (CPS) must be able to detect attacks before they can cause significant damage. To achieve this, \emph{intrusion detection systems} (IDS) may be deployed, which can detect attacks and alert ...

SESSION: Testbeds, Simulations, and Requirements
research-article
Public Access
A Real-Time Testbed Environment for Cyber-Physical Security on the Power Grid

The trustworthiness and security of cyber-physical systems (CPSs), such as the power grid, are of paramount importance to ensure their safe operation, performance, and economic efficiency. The aim of many cyber-physical security techniques, such as ...

research-article
Secure RTOS Architecture for Building Automation

Building Automation System (BAS) is a computer-based control system that is widely installed in office buildings and laboratories for monitoring and controlling mechanical/electrical equipment. With the advancements in Cyber-Physical System (CPS) and ...

research-article
MiniCPS: A Toolkit for Security Research on CPS Networks

In recent years, tremendous effort has been spent to modernizing communication infrastructure in Cyber-Physical Systems (CPS) such as Industrial Control Systems (ICS) and related Supervisory Control and Data Acquisition (SCADA) systems. While a great ...

SESSION: Security Assurance and Assessment
research-article
Assurance Techniques for Industrial Control Systems (ICS)

Assurance techniques generate evidence that allow us to make claims of assurance about security. For the purpose of certification to an assurance scheme, this evidence enables us to answer the question: are the implemented security controls consistent ...

research-article
A Field Study of Digital Forensics of Intrusions in the Electrical Power Grid

The paper describes the findings of a field study that we conducted to practically determine the digital forensics processes, tools, and technical considerations that apply to investigations of computer intrusions into the electrical power grid. Our ...

Contributors
  • Colorado State University
  • MITRE Corporation
  • University of California, Santa Cruz
Index terms have been assigned to the content through auto-classification.

Recommendations

Acceptance Rates

CPS-SPC '15 Paper Acceptance Rate11of20submissions,55%Overall Acceptance Rate53of66submissions,80%
YearSubmittedAcceptedRate
CPS-SPC '181022220%
CPS '1710880%
CPS-SPC '16261246%
CPS-SPC '15201155%
Overall665380%