skip to main content
10.1145/3445969acmconferencesBook PagePublication PagescodaspyConference Proceedingsconference-collections
SAT-CPS '21: Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems
ACM2021 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy Virtual Event USA 28 April 2021
ISBN:
978-1-4503-8319-6
Published:
26 April 2021
Sponsors:
Next Conference
Bibliometrics
Skip Abstract Section
Abstract

Welcome to the first ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaT-CPS 2021) held in conjunction with the 11th ACM Conference on Data and Applications Security and Privacy (CODASPY 2017). SaT-CPS aims to represent a forum for researchers and practitioners from industry and academia interested in various areas of CPS security. SaT-CPS features novel submissions describing practical and theoretical solutions for cyber security challenges in CPS.

Cyber-physical systems (CPS) entail seamless integration of computation and physical components. These systems illustrate the synergistic interactions among the cyber components, such as the computing and communication parts, and the physical devices, operating at wide varieties of spatial and temporal time scales. CPS is driving innovation and competition in a range of sectors, including agriculture, aeronautics, building design, civil infrastructure, energy, environmental quality, healthcare and personalized medicine, and transportation. These applications will empower the true vision of CPS allowing human beings to interact with the physical world and serve critical functions in our lives. CPS technologies are emerging to be the key drivers for future autonomous and smart connected worlds. With the wider adoption and popularity of the CPS applications, securing them against malicious activities is paramount. Otherwise, malfunctioning and insecure CPS devices and applications can cause enormous damage to individuals, businesses, and nations.

The call for papers attracted submissions from Asia, Canada, Europe, and the United States. We received 17 submissions, and accepted 8 full papers and 4 short papers. In addition, we have 1 keynote from Dr Kalyan Perumalla (Oak Ridge National Laboratory) and a tutorial session on AI assisted Malware Analysis in the full day workshop.

Skip Table Of Content Section
SESSION: Keynote Talk
abstract
Public Access
Trust-but-Verify in Cyber-Physical Systems

Cyber-physical systems span a wide spectrum, from long-lived legacy systems to more modern installations. Trust is an issue that arises across the spectrum, albeit with different variants of goals and constraints. On the one end of the spectrum, legacy ...

SESSION: Session 1: AI for CPS Security
research-article
Open Access
Capturing Autonomy in its Multiple Facets: A Digital Twin Approach

Autonomy has been touted to be a major asset of Cyber-Physical Systems (CPS) and its components. By intertwining non-physical and physical processes they seamlessly integrate interdependent computational and physical components. In this contribution we ...

research-article
Trustworthy Data Analysis and Sensor Data Protection in Cyber-Physical Systems

Cyber-Physical Systems are widely used in critical infrastructures such as the power grids, water purification systems, nuclear plants, oil refinery and compressor plants, food manufacturing, etc. Anomalies in these systems can be a result of ...

research-article
Open Access
A Flexible Security Analytics Service for the Industrial IoT

In Cloud Computing, the cloud serves as a central data hub for the Industrial Internet of Things' (IIoT) data and is deployed in diverse application fields, e.g., Smart Grid or Smart Manufacturing. Therefore, the aggregated and contextualized data is ...

short-paper
Privacy Protection of Grid Users Data with Blockchain and Adversarial Machine Learning

Utilities around the world are reported to invest a total of around \$30 billion over the next few years for installation of more than 300 million smart meters, replacing traditional analog meters \citeinfo. By mid-decade, with full country wide ...

SESSION: Session 2: Access Control
research-article
Public Access
The HABAC Model for Smart Home IoT and Comparison to EGRBAC

In the near future IoT will be part of every home turning our houses into smart houses, in which we have multiple users with complex social relationships between them using the same smart devices. This requires sophisticated access control specification ...

research-article
Public Access
Role-Based Administration of Role-Based Smart Home IoT

Using role-based access control (RBAC) to manage RBAC is among RBAC's attractive benefits, contributing to its long-standing dominance in practice. Administrative models facilitate management of (mostly configuration) changes in the underlying ...

research-article
Ontology driven AI and Access Control Systems for Smart Fisheries

Increasing number of internet connected devices has paved a path for smarter ecosystems in various sectors such as agriculture, aquaculture, manufacturing, healthcare, etc. Especially, integrating technologies like big data, artificial intelligence (AI),...

short-paper
A Data-based Protocol for One-way Trust in Inter-vehicular Communication

As autonomous vehicles fill the roads and more manufacturers join the trend, the need for a unified communication protocol grows. Current paradigms in vehicle-to-vehicle communication are too slow to provide accurate and meaningful traffic data in a ...

SESSION: Session 3: Tutorial
abstract
Artificial Intelligence Assisted Malware Analysis

This tutorial provides a review of the state-of-the-art research and the applications of Artificial Intelligence and Machine Learning for malware analysis. We will provide an overview, background and results with respect to the three main malware ...

SESSION: Session 4: Miscellaneous Topics
research-article
Transparent End-to-End Security for Publish/Subscribe Communication in Cyber-Physical Systems

The ongoing digitization of industrial manufacturing leads to a decisive change in industrial communication paradigms. Moving from traditional one-to-one to many-to-many communication, publish/subscribe systems promise a more dynamic and efficient ...

research-article
A Matrix for Systematic Selection of Authentication Mechanisms in Challenging Healthcare related Environments

Passwords continue to dominate the authentication landscape, while One Time Passwords (OTPs) provided by apps are increasingly used as second factor. Even though several alternatives are developed, very few regard usability. Even fewer alternatives ...

short-paper
Open Access
Generating Threat Models and Attack Graphs based on the IEC 61850 System Configuration description Language

Due to our dependency on electricity, it is vital to keep our power systems secure from cyber attacks. However, because power systems are being digitalized and the infrastructure is growing increasingly complicated, it is difficult to gain an overview ...

short-paper
Vulnerability Assessment of the Rowhammer Attack Using Machine Learning and the gem5 Simulator - Work in Progress

Modern computer memories have been shown to have reliability issues. The main memory is the target of a security attack called Rowhammer, which causes bit flips in adjacent victim cells of aggressor rows. Multiple mitigation techniques have been ...

Contributors
  • Tennessee Technological University
  • North Carolina Agricultural and Technical State University
  • Mississippi State University
  1. Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems

      Recommendations