It is our great pleasure to welcome you to CPSS 2017, the third ACM Cyber-Physical System Security Workshop, co-located with ACM AsiaCCS 2017 and held in Abu Dhabi, UAE on 2 April 2017.
The call for papers attracted 35 submissions from 23 countries: Algeria, Australia, Austria, Belgium, Canada, China, Croatia, Denmark, France, Germany, Greece, India, Israel, Korea, Kuwait, Netherlands, New Zealand, Portugal, Singapore, Sweden, UAE, UK and USA. These papers were evaluated on the basis of their significance, novelty, technical quality and practical impact. The review process was double-blinded. The program committee members have put in a significant effort in paper evaluation, and most of the papers received 4 reviews. Finally we accepted 10 papers for presentation at the workshop, with an acceptance rate of 29%. As announced in the CFP, there will be a best paper award, to encourage more high quality submissions to CPSS. The winner will be revealed at the closing session of the workshop, and also listed at the CPSS home page http://jianying.space/cpss/.
Besides the 10 technical presentations, there are also 2 keynote speeches. These valuable and insightful talks will guide us to a better understanding of CPS security challenges and opportunities.
"On the Disappearing Boundary between Digital, Physical, and Social Spaces -- Who, what, where and when" by Prof. Bashar Nuseibeh (Lero, Ireland & The Open University, UK)
"Security of the Autonomous Ship" by Prof. Sokratis Katsikas (NTNU, Norway)
Proceeding Downloads
On the Disappearing Boundary Between Digital, Physical, and Social Spaces: Who, What, Where and When?
Boundaries play a critical role in the systems development process. In software engineering, boundaries are used to scope the real world problems that the software is required to address, and to scope the design solutions through which the software will ...
Cyber-Physical System Discovery: Reverse Engineering Physical Processes
Successful cyber attacks against cyber-physical systems require expert knowledge about the dynamic behaviour of the underlying physical process. Therefore, obtaining the relevant information is a crucial part during attack preparation. Previous work has ...
Secure 3D Printing: Reconstructing and Validating Solid Geometries using Toolpath Reverse Engineering
As 3D printing becomes more ubiquitous, traditional centralized process chains are transformed to a distributed manufacturing model, where each step of the process can be outsourced to different parties. Despite the countless benefits of this ...
Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay
Traditional countermeasures to relay attacks are difficult to implement on mobile devices due to hardware limitations. Establishing proximity of a payment device and terminal is the central notion of most relay attack countermeasures, and mobile devices ...
Detecting Phishing Websites using Automation of Human Behavior
In this paper, we propose a technique to detect phishing attacks based on behavior of human when exposed to fake website. Some online users submit fake credentials to the login page before submitting their actual credentials. He/She observes the login ...
A Cross-Layer Key Establishment Model for Wireless Devices in Cyber-Physical Systems
Wireless communications in Cyber-Physical Systems (CPS) are vulnerable to many adversarial attacks such as eavesdropping. To secure the communications, secret session keys need to be established between wireless devices. In existing symmetric key ...
SIPHON: Towards Scalable High-Interaction Physical Honeypots
- Juan David Guarnizo,
- Amit Tambe,
- Suman Sankar Bhunia,
- Martin Ochoa,
- Nils Ole Tippenhauer,
- Asaf Shabtai,
- Yuval Elovici
In recent years, the emerging Internet-of-Things (IoT) has led to rising concerns about the security of networked embedded devices. In this work, we propose the SIPHON architecture---a Scalable high-Interaction Honeypot platform for IoT devices. Our ...
ViotSOC: Controlling Access to Dynamically Virtualized IoT Services using Service Object Capability
Virtualization of Internet of Things(IoT) is a concept of dynamically building customized high-level IoT services which rely on the real time data streams from low-level physical IoT sensors. Security in IoT virtualization is challenging, because with ...
A Functional Co-Design towards Safe and Secure Vehicle Platooning
Cooperative adaptive cruise control (CACC) or platooning recently becomes promising as vehicles can learn of nearby vehicles? intentions and dynamics through wireless vehicle to vehicle (V2V) communication and advanced on-board sensing technologies. ...
Towards Improving Data Validity of Cyber-Physical Systems through Path Redundancy
Cyber-physical systems have shown to be susceptible to cyber-attacks. Incidents such as Stuxnet Attack and Ukraine power outage have shown that attackers are capable of penetrating into industrial control systems, compromising PLCs, and sending false ...
Spatio-Temporal Correlations in Cyber-Physical Systems: A Defense Against Data Availability Attacks
Many cyber-physical systems (CPS) use geographically distributed instrumentation to monitor and control the operation of the underlying system in real time. The availability of real-time measurements from deployed instrumentation is critical for the ...
Index Terms
- Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security