Welcome to the fourth ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaT-CPS 2024) held in conjunction with the 14th ACM Conference on Data and Application Security and Privacy (CODASPY 2024). ACM SaT-CPS aims to represent a forum for researchers and practitioners from industry and academia interested in various areas of CPS security. SaTCPS features novel submissions describing practical and theoretical solutions for cyber security challenges in CPS. Cyber-physical systems (CPS) entail seamless integration of computation and physical components. These systems illustrate the synergistic interactions among the cyber components, such as the computing and communication parts, and the physical devices, operating at wide varieties of spatial and temporal time scales. CPS is driving innovation and competition in a range of sectors, including agriculture, aeronautics, building design, civil infrastructure, energy, environmental quality, healthcare and personalized medicine, and transportation. These applications will empower the true vision of CPS allowing human beings to interact with the physical world and serve critical functions in our lives. CPS technologies are emerging to be the key drivers for future autonomous and smart connected worlds. With the wider adoption and popularity of the CPS applications, securing them against malicious activities is paramount. Otherwise, malfunctioning and insecure CPS devices and applications can cause enormous damage to individuals, businesses, and nations.
Proceeding Downloads
Synthetic Data Digital Twins and Data Trusts Control for Privacy in Health Data Sharing
Health data sharing is very valuable for medical research since it has the propensity to improve diagnostics, policy, medication, and so on. At the same time, sharing health data needs to be done without compromising the privacy of patients and ...
NVM-Flip: Non-Volatile-Memory BitFlips on the System Level
- Felix Staudigl,
- Jan Philipp Thoma,
- Christian Niesler,
- Karl Sturm,
- Rebecca Pelke,
- Dominik Germek,
- Jan Moritz Joseph,
- Tim Güneysu,
- Lucas Davi,
- Rainer Leupers
Emerging non-volatile memories (NVMs) are promising candidates to substitute conventional memories due to their low access latency, high integration density, and non-volatility. These superior properties stem from the memristor representing the ...
A Simple Mobile Plausibly Deniable System Using Image Steganography and Secure Hardware
Traditional encryption methods cannot defend against coercive attacks in which the adversary captures both the user and the possessed computing device, and forces the user to disclose the decryption keys. Plausibly deniable encryption (PDE) has been ...
Automated Generation and Update of Structured ABAC Policies
We present a new access control policy generation algorithm that also offers a solution to the policy update problem. The algorithm generates structured attribute-based access control policies, more precisely, it generates a categorisation of principals ...
SAFEHIVE: Secure Attestation Framework for Embedded and Heterogeneous IoT Devices in Variable Environments
Nowadays smart contexts (such as smart cities/homes, or Industry 4.0) are rapidly gaining popularity. These new paradigms are enabled by the adoption of smart devices, that allow several programmatically driven actions. The Internet of Things (IoT) is ...
HETCOM: Heterogeneous Container Migration Based on TEE- or TPM-established Trust
In Cyber-Physical Systems such as Smart Factories, containers are an important building block. In the event of an attack, it is crucial that affected containers can be migrated to a sandboxed environment for further analysis. Containers not affected need ...
Exploring the Impact of Increased Health Information Accessibility in Cyberspace on Trust and Self-care Practices
More health information is in cyberspace than ever before, presenting both opportunities and challenges for health information seeking and self-care practices, particularly in underserved populations who face health disparities for various reasons ...
RF-WAVEGUARD: Enhancing UAV Security Against Signal Jamming Attacks through Radio Frequency Watermarking
As Unmanned Aerial Vehicles (UAVs) become increasingly integral to a variety of industries, their dependency on radio frequency (RF) signal-based communication systems has exposed them to a multitude of security vulnerabilities. One of the most notable ...
Environment Aware Deep Learning Based Access Control Model
Recently Deep Learning based Access Control (DLBAC) model has been developed to reduce the burden of access control model engineering on a human administrator, while managing accurate access control state in large, complex, and dynamic systems. DLBAC ...