Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3643650acmconferencesBook PagePublication PagescodaspyConference Proceedingsconference-collections
SaT-CPS '24: Proceedings of the 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems
ACM2024 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CODASPY '24: Fourteenth ACM Conference on Data and Application Security and Privacy Porto Portugal 21 June 2024
ISBN:
979-8-4007-0555-7
Published:
19 June 2024
Sponsors:

Bibliometrics
Skip Abstract Section
Abstract

Welcome to the fourth ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaT-CPS 2024) held in conjunction with the 14th ACM Conference on Data and Application Security and Privacy (CODASPY 2024). ACM SaT-CPS aims to represent a forum for researchers and practitioners from industry and academia interested in various areas of CPS security. SaTCPS features novel submissions describing practical and theoretical solutions for cyber security challenges in CPS. Cyber-physical systems (CPS) entail seamless integration of computation and physical components. These systems illustrate the synergistic interactions among the cyber components, such as the computing and communication parts, and the physical devices, operating at wide varieties of spatial and temporal time scales. CPS is driving innovation and competition in a range of sectors, including agriculture, aeronautics, building design, civil infrastructure, energy, environmental quality, healthcare and personalized medicine, and transportation. These applications will empower the true vision of CPS allowing human beings to interact with the physical world and serve critical functions in our lives. CPS technologies are emerging to be the key drivers for future autonomous and smart connected worlds. With the wider adoption and popularity of the CPS applications, securing them against malicious activities is paramount. Otherwise, malfunctioning and insecure CPS devices and applications can cause enormous damage to individuals, businesses, and nations.

Skip Table Of Content Section
SESSION: Session 1: Cyber Physical Systems Security Session I
research-article
Free
Synthetic Data Digital Twins and Data Trusts Control for Privacy in Health Data Sharing

Health data sharing is very valuable for medical research since it has the propensity to improve diagnostics, policy, medication, and so on. At the same time, sharing health data needs to be done without compromising the privacy of patients and ...

research-article
Open Access
NVM-Flip: Non-Volatile-Memory BitFlips on the System Level

Emerging non-volatile memories (NVMs) are promising candidates to substitute conventional memories due to their low access latency, high integration density, and non-volatility. These superior properties stem from the memristor representing the ...

research-article
Open Access
A Simple Mobile Plausibly Deniable System Using Image Steganography and Secure Hardware

Traditional encryption methods cannot defend against coercive attacks in which the adversary captures both the user and the possessed computing device, and forces the user to disclose the decryption keys. Plausibly deniable encryption (PDE) has been ...

SESSION: Session 2: Cyber Physical Systems Security II
research-article
Open Access
Automated Generation and Update of Structured ABAC Policies

We present a new access control policy generation algorithm that also offers a solution to the policy update problem. The algorithm generates structured attribute-based access control policies, more precisely, it generates a categorisation of principals ...

research-article
Open Access
SAFEHIVE: Secure Attestation Framework for Embedded and Heterogeneous IoT Devices in Variable Environments

Nowadays smart contexts (such as smart cities/homes, or Industry 4.0) are rapidly gaining popularity. These new paradigms are enabled by the adoption of smart devices, that allow several programmatically driven actions. The Internet of Things (IoT) is ...

research-article
Open Access
HETCOM: Heterogeneous Container Migration Based on TEE- or TPM-established Trust

In Cyber-Physical Systems such as Smart Factories, containers are an important building block. In the event of an attack, it is crucial that affected containers can be migrated to a sandboxed environment for further analysis. Containers not affected need ...

SESSION: Session 3: Cyber Physical Systems Security Session III
research-article
Open Access
Exploring the Impact of Increased Health Information Accessibility in Cyberspace on Trust and Self-care Practices

More health information is in cyberspace than ever before, presenting both opportunities and challenges for health information seeking and self-care practices, particularly in underserved populations who face health disparities for various reasons ...

research-article
Open Access
RF-WAVEGUARD: Enhancing UAV Security Against Signal Jamming Attacks through Radio Frequency Watermarking

As Unmanned Aerial Vehicles (UAVs) become increasingly integral to a variety of industries, their dependency on radio frequency (RF) signal-based communication systems has exposed them to a multitude of security vulnerabilities. One of the most notable ...

research-article
Open Access
Environment Aware Deep Learning Based Access Control Model

Recently Deep Learning based Access Control (DLBAC) model has been developed to reduce the burden of access control model engineering on a human administrator, while managing accurate access control state in large, complex, and dynamic systems. DLBAC ...

Contributors
  • Tennessee Technological University
  • North Carolina Agricultural and Technical State University
  • The University of Texas at San Antonio
  • University of Tartu

Recommendations