- Sponsor:
- sigsac
Welcome to the first ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaT-CPS 2021) held in conjunction with the 11th ACM Conference on Data and Applications Security and Privacy (CODASPY 2017). SaT-CPS aims to represent a forum for researchers and practitioners from industry and academia interested in various areas of CPS security. SaT-CPS features novel submissions describing practical and theoretical solutions for cyber security challenges in CPS.
Cyber-physical systems (CPS) entail seamless integration of computation and physical components. These systems illustrate the synergistic interactions among the cyber components, such as the computing and communication parts, and the physical devices, operating at wide varieties of spatial and temporal time scales. CPS is driving innovation and competition in a range of sectors, including agriculture, aeronautics, building design, civil infrastructure, energy, environmental quality, healthcare and personalized medicine, and transportation. These applications will empower the true vision of CPS allowing human beings to interact with the physical world and serve critical functions in our lives. CPS technologies are emerging to be the key drivers for future autonomous and smart connected worlds. With the wider adoption and popularity of the CPS applications, securing them against malicious activities is paramount. Otherwise, malfunctioning and insecure CPS devices and applications can cause enormous damage to individuals, businesses, and nations.
The call for papers attracted submissions from Asia, Canada, Europe, and the United States. We received 17 submissions, and accepted 8 full papers and 4 short papers. In addition, we have 1 keynote from Dr Kalyan Perumalla (Oak Ridge National Laboratory) and a tutorial session on AI assisted Malware Analysis in the full day workshop.
Proceeding Downloads
Trust-but-Verify in Cyber-Physical Systems
Cyber-physical systems span a wide spectrum, from long-lived legacy systems to more modern installations. Trust is an issue that arises across the spectrum, albeit with different variants of goals and constraints. On the one end of the spectrum, legacy ...
Capturing Autonomy in its Multiple Facets: A Digital Twin Approach
Autonomy has been touted to be a major asset of Cyber-Physical Systems (CPS) and its components. By intertwining non-physical and physical processes they seamlessly integrate interdependent computational and physical components. In this contribution we ...
Trustworthy Data Analysis and Sensor Data Protection in Cyber-Physical Systems
Cyber-Physical Systems are widely used in critical infrastructures such as the power grids, water purification systems, nuclear plants, oil refinery and compressor plants, food manufacturing, etc. Anomalies in these systems can be a result of ...
A Flexible Security Analytics Service for the Industrial IoT
In Cloud Computing, the cloud serves as a central data hub for the Industrial Internet of Things' (IIoT) data and is deployed in diverse application fields, e.g., Smart Grid or Smart Manufacturing. Therefore, the aggregated and contextualized data is ...
Privacy Protection of Grid Users Data with Blockchain and Adversarial Machine Learning
Utilities around the world are reported to invest a total of around \$30 billion over the next few years for installation of more than 300 million smart meters, replacing traditional analog meters \citeinfo. By mid-decade, with full country wide ...
The HABAC Model for Smart Home IoT and Comparison to EGRBAC
In the near future IoT will be part of every home turning our houses into smart houses, in which we have multiple users with complex social relationships between them using the same smart devices. This requires sophisticated access control specification ...
Role-Based Administration of Role-Based Smart Home IoT
Using role-based access control (RBAC) to manage RBAC is among RBAC's attractive benefits, contributing to its long-standing dominance in practice. Administrative models facilitate management of (mostly configuration) changes in the underlying ...
Ontology driven AI and Access Control Systems for Smart Fisheries
- Sai Sree Laya Chukkapalli,
- Shaik Barakhat Aziz,
- Nouran Alotaibi,
- Sudip Mittal,
- Maanak Gupta,
- Mahmoud Abdelsalam
Increasing number of internet connected devices has paved a path for smarter ecosystems in various sectors such as agriculture, aquaculture, manufacturing, healthcare, etc. Especially, integrating technologies like big data, artificial intelligence (AI),...
A Data-based Protocol for One-way Trust in Inter-vehicular Communication
As autonomous vehicles fill the roads and more manufacturers join the trend, the need for a unified communication protocol grows. Current paradigms in vehicle-to-vehicle communication are too slow to provide accurate and meaningful traffic data in a ...
Artificial Intelligence Assisted Malware Analysis
This tutorial provides a review of the state-of-the-art research and the applications of Artificial Intelligence and Machine Learning for malware analysis. We will provide an overview, background and results with respect to the three main malware ...
Transparent End-to-End Security for Publish/Subscribe Communication in Cyber-Physical Systems
The ongoing digitization of industrial manufacturing leads to a decisive change in industrial communication paradigms. Moving from traditional one-to-one to many-to-many communication, publish/subscribe systems promise a more dynamic and efficient ...
A Matrix for Systematic Selection of Authentication Mechanisms in Challenging Healthcare related Environments
Passwords continue to dominate the authentication landscape, while One Time Passwords (OTPs) provided by apps are increasingly used as second factor. Even though several alternatives are developed, very few regard usability. Even fewer alternatives ...
Generating Threat Models and Attack Graphs based on the IEC 61850 System Configuration description Language
Due to our dependency on electricity, it is vital to keep our power systems secure from cyber attacks. However, because power systems are being digitalized and the infrastructure is growing increasingly complicated, it is difficult to gain an overview ...
Vulnerability Assessment of the Rowhammer Attack Using Machine Learning and the gem5 Simulator - Work in Progress
Modern computer memories have been shown to have reliability issues. The main memory is the target of a security attack called Rowhammer, which causes bit flips in adjacent victim cells of aggressor rows. Multiple mitigation techniques have been ...
- Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems