Welcome to the second ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaT-CPS 2022) held in conjunction with the 12th ACM Conference on Data and Application Security and Privacy (CODASPY 2022). SaT-CPS aims to represent a forum for researchers and practitioners from industry and academia interested in various areas of CPS security. SaT-CPS features novel submissions describing practical and theoretical solutions for cyber security challenges in CPS. Cyber-physical systems (CPS) entail seamless integration of computation and physical components. These systems illustrate the synergistic interactions among the cyber components, such as the computing and communication parts, and the physical devices, operating at wide varieties of spatial and temporal time scales. CPS is driving innovation and competition in a range of sectors, including agriculture, aeronautics, building design, civil infrastructure, energy, environmental quality, healthcare and personalized medicine, and transportation. These applications will empower the true vision of CPS allowing human beings to interact with the physical world and serve critical functions in our lives. CPS technologies are emerging to be the key drivers for future autonomous and smart connected worlds. With the wider adoption and popularity of the CPS applications, securing them against malicious activities is paramount. Otherwise, malfunctioning and insecure CPS devices and applications can cause enormous damage to individuals, businesses, and nations.
Proceeding Downloads
Secure, Trustworthy and Scalable Digital Manufacturing Cyber-Physical System
The digital manufacturing cyber-physical system makes extensive use of computational tools, optimization methods and machine learning models. Development of a scalable, reliable and resilient future manufacturing system requires integrating security as ...
A Cyber-Physical Experimentation Platform for Resilience Analysis
- Jamie Thorpe,
- Raymond Fasano,
- Meghan Galiardi Sahakian,
- Amanda Gonzales,
- Andrew Hahn,
- Joshua Morris,
- Timothy Ortiz,
- Hannah Reinbolt,
- Eric D. Vugrin
Recent high profile cyber attacks on critical infrastructures have raised awareness about the severe and widespread impacts that these attacks can have on everyday life. This awareness has spurred research into making industrial control systems and ...
Generating Cyber-Physical System Risk Overlays for Attack and Fault Trees using Systems Theory
We describe a formalized systems theoretic method for creating cyber-physical system (CPS) risk overlays that augment existing tree-based models used in CPS risk and threat analysis processes. This top-down approach objectively scopes the system's ...
Optimal Security Hardening over a Probabilistic Attack Graph: A Case Study of an Industrial Control System using CySecTool
CySecTool is a tool that finds a cost-optimal security controls portfolio in a given budget for a probabilistic attack graph. A portfolio is a set of counter-measures, or controls, against vulnerabilities adopted for a computer system, while an attack ...
A Data-Centric Approach to Generate Invariants for a Smart Grid Using Machine Learning
Cyber-Physical Systems (CPS) have gained popularity due to the increased requirements on their uninterrupted connectivity and process automation. Due to their connectivity over the network including intranet and internet, dependence on sensitive data, ...
Securing Smart Home IoT Systems with Attribute-Based Access Control
Over the last few years, there has been an increased proliferation of IoT systems for smart homes, enabling owners to remotely manage a variety of devices and gadgets installed on their properties. This growth was made possible due to several innovative ...
Attribute Based Access Control Model for Protecting Programmable Logic Controllers
Industrial Control Systems (ICS) were traditionally designed as stand-alone systems and isolated from Internet Technology (IT) networks. With the advancement in communication technology, the attack surface has increased; vulnerabilities in ICS ...
Blockchain-Based Administration of Access in Smart Home IoT
There is a rising concern about authorization in IoT environments to be appropriately designed and applied, due to smart things surge to be part of people's daily lives on one hand, and the amount of personal/private information they utilize, on the ...
Quantifying Trustworthiness in Decentralized Trusted Applications
Decentralized systems play an important role in many modern data processing applications. Due to the distributed nature of these applications, participating system components are often operated by different stakeholders with potentially conflicting ...
A Framework for Automatic Labeling of Log Datasets from Model-driven Testbeds for HIDS Evaluation
Intrusion detection systems are essential for network security. To verify their detection capabilities and facilitate comparison, benchmark log datasets are used to measure evaluation metrics such as accuracy and false alarm rates. Thereby, it is ...
GyroidOS: Packaging Linux with a Minimal Surface
Separation of privilege domains is crucial when building secure system architectures for Cyber-Physical systems. The bar for a successful attack can be raised significantly and the consequences of an attack can be contained. As Cyber-physical systems ...
Employing Digital Twins for Security-by-Design System Testing
Ever since cyber attacks focused on industrial and critical infrastructure settings, the awareness of the security issues of these systems has increased. These industrial control systems (ICS) mainly focus on operation and availability -- instead of ...
SecureWeaver: Intent-Driven Secure System Designer
Design and management of networked systems, such as Information Technology/Network (IT/NW) or IoT systems, are inherently complex. Moreover, the need to adhere to security requirements adds even more complexity, as the manual audit and security ...
Index Terms
- Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems