Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3510547acmconferencesBook PagePublication PagescodaspyConference Proceedingsconference-collections
Sat-CPS '22: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems
ACM2022 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy Baltimore MD USA 27 April 2022
ISBN:
978-1-4503-9229-7
Published:
28 April 2022
Sponsors:

Reflects downloads up to 04 Oct 2024Bibliometrics
Skip Abstract Section
Abstract

Welcome to the second ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaT-CPS 2022) held in conjunction with the 12th ACM Conference on Data and Application Security and Privacy (CODASPY 2022). SaT-CPS aims to represent a forum for researchers and practitioners from industry and academia interested in various areas of CPS security. SaT-CPS features novel submissions describing practical and theoretical solutions for cyber security challenges in CPS. Cyber-physical systems (CPS) entail seamless integration of computation and physical components. These systems illustrate the synergistic interactions among the cyber components, such as the computing and communication parts, and the physical devices, operating at wide varieties of spatial and temporal time scales. CPS is driving innovation and competition in a range of sectors, including agriculture, aeronautics, building design, civil infrastructure, energy, environmental quality, healthcare and personalized medicine, and transportation. These applications will empower the true vision of CPS allowing human beings to interact with the physical world and serve critical functions in our lives. CPS technologies are emerging to be the key drivers for future autonomous and smart connected worlds. With the wider adoption and popularity of the CPS applications, securing them against malicious activities is paramount. Otherwise, malfunctioning and insecure CPS devices and applications can cause enormous damage to individuals, businesses, and nations.

Skip Table Of Content Section
SESSION: Keynote Talk
keynote
Secure, Trustworthy and Scalable Digital Manufacturing Cyber-Physical System

The digital manufacturing cyber-physical system makes extensive use of computational tools, optimization methods and machine learning models. Development of a scalable, reliable and resilient future manufacturing system requires integrating security as ...

SESSION: Session 1: Cyber Physical Systems Security
research-article
Public Access
A Cyber-Physical Experimentation Platform for Resilience Analysis

Recent high profile cyber attacks on critical infrastructures have raised awareness about the severe and widespread impacts that these attacks can have on everyday life. This awareness has spurred research into making industrial control systems and ...

research-article
Open Access
Generating Cyber-Physical System Risk Overlays for Attack and Fault Trees using Systems Theory

We describe a formalized systems theoretic method for creating cyber-physical system (CPS) risk overlays that augment existing tree-based models used in CPS risk and threat analysis processes. This top-down approach objectively scopes the system's ...

research-article
Open Access
Optimal Security Hardening over a Probabilistic Attack Graph: A Case Study of an Industrial Control System using CySecTool

CySecTool is a tool that finds a cost-optimal security controls portfolio in a given budget for a probabilistic attack graph. A portfolio is a set of counter-measures, or controls, against vulnerabilities adopted for a computer system, while an attack ...

short-paper
A Data-Centric Approach to Generate Invariants for a Smart Grid Using Machine Learning

Cyber-Physical Systems (CPS) have gained popularity due to the increased requirements on their uninterrupted connectivity and process automation. Due to their connectivity over the network including intranet and internet, dependence on sensitive data, ...

SESSION: Session 2: Access Control and Trust
research-article
Securing Smart Home IoT Systems with Attribute-Based Access Control

Over the last few years, there has been an increased proliferation of IoT systems for smart homes, enabling owners to remotely manage a variety of devices and gadgets installed on their properties. This growth was made possible due to several innovative ...

research-article
Public Access
Attribute Based Access Control Model for Protecting Programmable Logic Controllers

Industrial Control Systems (ICS) were traditionally designed as stand-alone systems and isolated from Internet Technology (IT) networks. With the advancement in communication technology, the attack surface has increased; vulnerabilities in ICS ...

research-article
Public Access
Blockchain-Based Administration of Access in Smart Home IoT

There is a rising concern about authorization in IoT environments to be appropriately designed and applied, due to smart things surge to be part of people's daily lives on one hand, and the amount of personal/private information they utilize, on the ...

research-article
Quantifying Trustworthiness in Decentralized Trusted Applications

Decentralized systems play an important role in many modern data processing applications. Due to the distributed nature of these applications, participating system components are often operated by different stakeholders with potentially conflicting ...

SESSION: Session 3: Miscellaneous Topics
research-article
Open Access
A Framework for Automatic Labeling of Log Datasets from Model-driven Testbeds for HIDS Evaluation

Intrusion detection systems are essential for network security. To verify their detection capabilities and facilitate comparison, benchmark log datasets are used to measure evaluation metrics such as accuracy and false alarm rates. Thereby, it is ...

research-article
Open Access
GyroidOS: Packaging Linux with a Minimal Surface

Separation of privilege domains is crucial when building secure system architectures for Cyber-Physical systems. The bar for a successful attack can be raised significantly and the consequences of an attack can be contained. As Cyber-physical systems ...

research-article
Open Access
Employing Digital Twins for Security-by-Design System Testing

Ever since cyber attacks focused on industrial and critical infrastructure settings, the awareness of the security issues of these systems has increased. These industrial control systems (ICS) mainly focus on operation and availability -- instead of ...

research-article
SecureWeaver: Intent-Driven Secure System Designer

Design and management of networked systems, such as Information Technology/Network (IT/NW) or IoT systems, are inherently complex. Moreover, the need to adhere to security requirements adds even more complexity, as the manual audit and security ...

Contributors
  • Tennessee Technological University
  • North Carolina Agricultural and Technical State University
  • North Carolina Agricultural and Technical State University
Index terms have been assigned to the content through auto-classification.

Recommendations