With great pleasure we welcome you to CPSS 2019 - the fifth ACM Cyber-Physical System Security Workshop, co-located with ACM AsiaCCS 2019, and held in Auckland, New Zealand on July 8, 2019.
Each submission, received in response to the Call for Papers, was evaluated by at least three members of the Program Committee based on their significance, novelty, technical quality and relevance for the field. The review process was double-blind. Members of the program committee have put in a significant effort in paper evaluation. A total of five submissions were accepted, with 36% acceptance rate, for presentation based on recommendations by the reviewers.
Proceeding Downloads
Exploiting Correlations to Detect False Data Injections in Low-Density Wireless Sensor Networks
We propose a novel framework to detect false data injections in a low-density sensor environment with heterogeneous sensor data. The proposed detection algorithm learns how each sensor's data correlates within the sensor network, and false data is ...
Intrusion Detection Using Growing Hierarchical Self-Organizing Maps and Comparison with other Intrusion Detection Techniques
Intrusion detection systems (IDS) based on machine learning (ML) can be used to detect anomalies in data traffic. Common challenges for IDSs are low detection rates, high false alarm rates, and the need to process large amount of data. In order to ...
Towards a Cyber-Physical Range
Cyber-physical systems are being increasingly employed in everyday applications, including critical ones. This integration of operational technology systems, originally designed to operate in physical isolation -hence with no or little cyber security ...
Access Control for Internet of Things Applications
Internet of Things (IoT) consists of multifarious devices communicating with each other, with the environment, and also with people to provide enhanced functionality and experience for the users. Security and privacy breaches in such smart environments ...
Deriving Impact-driven Security Requirements and Monitoring Measures for Industrial IoT
The emerging Industrial Internet of Things (IIoT) is characterized by heterogeneous systems, loose topologies, cross-company data flows, changing entities, and high cybersecurity requirements. This development makes a sound security architecture an even ...
Decentralized Firmware Attestation for In-Vehicle Networks
Today's vehicles are equipped with a large number of Electronic Control Units (ECUs), which control everything from heating to steering and braking. Due to the increasing complexity and inter-dependency of these units, it has become essential for an ECU ...