skip to main content
10.1145/3055186acmconferencesBook PagePublication Pagesasia-ccsConference Proceedingsconference-collections
CPSS '17: Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security
ACM2017 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ASIA CCS '17: ACM Asia Conference on Computer and Communications Security Abu Dhabi United Arab Emirates 2 April 2017
ISBN:
978-1-4503-4956-7
Published:
02 April 2017
Sponsors:

Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to CPSS 2017, the third ACM Cyber-Physical System Security Workshop, co-located with ACM AsiaCCS 2017 and held in Abu Dhabi, UAE on 2 April 2017.

The call for papers attracted 35 submissions from 23 countries: Algeria, Australia, Austria, Belgium, Canada, China, Croatia, Denmark, France, Germany, Greece, India, Israel, Korea, Kuwait, Netherlands, New Zealand, Portugal, Singapore, Sweden, UAE, UK and USA. These papers were evaluated on the basis of their significance, novelty, technical quality and practical impact. The review process was double-blinded. The program committee members have put in a significant effort in paper evaluation, and most of the papers received 4 reviews. Finally we accepted 10 papers for presentation at the workshop, with an acceptance rate of 29%. As announced in the CFP, there will be a best paper award, to encourage more high quality submissions to CPSS. The winner will be revealed at the closing session of the workshop, and also listed at the CPSS home page http://jianying.space/cpss/.

Besides the 10 technical presentations, there are also 2 keynote speeches. These valuable and insightful talks will guide us to a better understanding of CPS security challenges and opportunities.

  • "On the Disappearing Boundary between Digital, Physical, and Social Spaces -- Who, what, where and when" by Prof. Bashar Nuseibeh (Lero, Ireland & The Open University, UK)

  • "Security of the Autonomous Ship" by Prof. Sokratis Katsikas (NTNU, Norway)

Skip Table Of Content Section
SESSION: Keynote 1
invited-talk
On the Disappearing Boundary Between Digital, Physical, and Social Spaces: Who, What, Where and When?

Boundaries play a critical role in the systems development process. In software engineering, boundaries are used to scope the real world problems that the software is required to address, and to scope the design solutions through which the software will ...

SESSION: Session 1: Threat Modeling for CPS
research-article
Cyber-Physical System Discovery: Reverse Engineering Physical Processes

Successful cyber attacks against cyber-physical systems require expert knowledge about the dynamic behaviour of the underlying physical process. Therefore, obtaining the relevant information is a crucial part during attack preparation. Previous work has ...

research-article
Secure 3D Printing: Reconstructing and Validating Solid Geometries using Toolpath Reverse Engineering

As 3D printing becomes more ubiquitous, traditional centralized process chains are transformed to a distributed manufacturing model, where each step of the process can be outsourced to different parties. Despite the countless benefits of this ...

SESSION: Session 2: Data Security and Privacy for CPS
research-article
Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay

Traditional countermeasures to relay attacks are difficult to implement on mobile devices due to hardware limitations. Establishing proximity of a payment device and terminal is the central notion of most relay attack countermeasures, and mobile devices ...

research-article
Detecting Phishing Websites using Automation of Human Behavior

In this paper, we propose a technique to detect phishing attacks based on behavior of human when exposed to fake website. Some online users submit fake credentials to the login page before submitting their actual credentials. He/She observes the login ...

research-article
A Cross-Layer Key Establishment Model for Wireless Devices in Cyber-Physical Systems

Wireless communications in Cyber-Physical Systems (CPS) are vulnerable to many adversarial attacks such as eavesdropping. To secure the communications, secret session keys need to be established between wireless devices. In existing symmetric key ...

SESSION: Keynote 2
invited-talk
Cyber Security of the Autonomous Ship
SESSION: Session 3: IoT Security
research-article
SIPHON: Towards Scalable High-Interaction Physical Honeypots

In recent years, the emerging Internet-of-Things (IoT) has led to rising concerns about the security of networked embedded devices. In this work, we propose the SIPHON architecture---a Scalable high-Interaction Honeypot platform for IoT devices. Our ...

research-article
ViotSOC: Controlling Access to Dynamically Virtualized IoT Services using Service Object Capability

Virtualization of Internet of Things(IoT) is a concept of dynamically building customized high-level IoT services which rely on the real time data streams from low-level physical IoT sensors. Security in IoT virtualization is challenging, because with ...

SESSION: Session 4: Attack Defense for CPS
research-article
A Functional Co-Design towards Safe and Secure Vehicle Platooning

Cooperative adaptive cruise control (CACC) or platooning recently becomes promising as vehicles can learn of nearby vehicles? intentions and dynamics through wireless vehicle to vehicle (V2V) communication and advanced on-board sensing technologies. ...

research-article
Public Access
Towards Improving Data Validity of Cyber-Physical Systems through Path Redundancy

Cyber-physical systems have shown to be susceptible to cyber-attacks. Incidents such as Stuxnet Attack and Ukraine power outage have shown that attackers are capable of penetrating into industrial control systems, compromising PLCs, and sending false ...

research-article
Spatio-Temporal Correlations in Cyber-Physical Systems: A Defense Against Data Availability Attacks

Many cyber-physical systems (CPS) use geographically distributed instrumentation to monitor and control the operation of the underlying system in real time. The availability of real-time measurements from deployed instrumentation is critical for the ...

Contributors
  • University of Milan
Index terms have been assigned to the content through auto-classification.

Recommendations

Acceptance Rates

CPSS '17 Paper Acceptance Rate10of35submissions,29%Overall Acceptance Rate33of113submissions,29%
YearSubmittedAcceptedRate
CPSS '1824625%
CPSS '17351029%
CPSS '1628829%
CPSS '1526935%
Overall1133329%