skip to main content
10.1145/3327961acmconferencesBook PagePublication Pagesasia-ccsConference Proceedingsconference-collections
CPSS '19: Proceedings of the 5th on Cyber-Physical System Security Workshop
ACM2019 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
Asia CCS '19: ACM Asia Conference on Computer and Communications Security Auckland New Zealand 8 July 2019
ISBN:
978-1-4503-6787-5
Published:
02 July 2019
Sponsors:

Bibliometrics
Skip Abstract Section
Abstract

With great pleasure we welcome you to CPSS 2019 - the fifth ACM Cyber-Physical System Security Workshop, co-located with ACM AsiaCCS 2019, and held in Auckland, New Zealand on July 8, 2019.

Each submission, received in response to the Call for Papers, was evaluated by at least three members of the Program Committee based on their significance, novelty, technical quality and relevance for the field. The review process was double-blind. Members of the program committee have put in a significant effort in paper evaluation. A total of five submissions were accepted, with 36% acceptance rate, for presentation based on recommendations by the reviewers.

Skip Table Of Content Section
SESSION: Session 1: Attack Detection in CPS
research-article
Exploiting Correlations to Detect False Data Injections in Low-Density Wireless Sensor Networks

We propose a novel framework to detect false data injections in a low-density sensor environment with heterogeneous sensor data. The proposed detection algorithm learns how each sensor's data correlates within the sensor network, and false data is ...

research-article
Open Access
Intrusion Detection Using Growing Hierarchical Self-Organizing Maps and Comparison with other Intrusion Detection Techniques

Intrusion detection systems (IDS) based on machine learning (ML) can be used to detect anomalies in data traffic. Common challenges for IDSs are low detection rates, high false alarm rates, and the need to process large amount of data. In order to ...

research-article
Towards a Cyber-Physical Range

Cyber-physical systems are being increasingly employed in everyday applications, including critical ones. This integration of operational technology systems, originally designed to operate in physical isolation -hence with no or little cyber security ...

SESSION: Keynote 2
keynote
Public Access
Access Control for Internet of Things Applications

Internet of Things (IoT) consists of multifarious devices communicating with each other, with the environment, and also with people to provide enhanced functionality and experience for the users. Security and privacy breaches in such smart environments ...

SESSION: Session 2: Risk Management and Attestation
research-article
Deriving Impact-driven Security Requirements and Monitoring Measures for Industrial IoT

The emerging Industrial Internet of Things (IIoT) is characterized by heterogeneous systems, loose topologies, cross-company data flows, changing entities, and high cybersecurity requirements. This development makes a sound security architecture an even ...

research-article
Decentralized Firmware Attestation for In-Vehicle Networks

Today's vehicles are equipped with a large number of Electronic Control Units (ECUs), which control everything from heating to steering and braking. Due to the increasing complexity and inter-dependency of these units, it has become essential for an ECU ...

Contributors
  • Singapore University of Technology and Design

Recommendations

Acceptance Rates

Overall Acceptance Rate33of113submissions,29%
YearSubmittedAcceptedRate
CPSS '1824625%
CPSS '17351029%
CPSS '1628829%
CPSS '1526935%
Overall1133329%