skip to main content
10.1145/3384941acmconferencesBook PagePublication Pagesasia-ccsConference Proceedingsconference-collections
CPSS '20: Proceedings of the 6th ACM on Cyber-Physical System Security Workshop
ACM2020 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security Taipei Taiwan 6 October 2020
ISBN:
978-1-4503-7608-2
Published:
06 October 2020
Sponsors:

Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to CPSS 2020, the sixth ACM Cyber-Physical System Security Workshop, co-located with ACM AsiaCCS 2020 and held online on 6 October 2020.

The call for papers attracted 17 submissions from Asia, Europe, and the United States, a good number of submissions considering the multiples issues that the COVID-19 pandemic has caused in the worldwide. Submissions were evaluated based on their significance, novelty, technical quality and relevance for the field. The review process was double-blinded. The program committee members have put in a significant effort in evaluating the papers, and most of the papers received three reviews with a high value in the ensued discussion. A total of six papers were finally accepted for presentation at the workshop, resulting in an acceptance rate of 35,3%.

In addition to the six technical presentations, a keynote talk by a prominent researcher in the CPS security area has been included in the workshop program. Our keynote speaker is Prof. Nils Ole Tippenhauer, of CISPA, Germany, and the title of his talk is "Trust, but Verify? Perspectives On Industrial Device Security".

Skip Table Of Content Section
SESSION: Keynote Talk
keynote
Trust, But Verify? Perspectives On Industrial Device Security

Industrial Control System (ICS) host devices such as Programable Logic Controllers (PLCs) are widely using proprietary realtime operating systems with little or no support for Cybersecurity features. Even security solutions widely used in mainstream ...

SESSION: Session1: Authentication and Security Requirements for CPS
research-article
Feasibility of PUF-Based Authentication on ATtiny Devices with Off-the-Shelf SRAM

With the proliferation of connected IoT devices over the last decade, security has become one of the most pronounced areas of technical concern. Furthermore, the most important challenge being device authentication and trust management of resource ...

research-article
Towards Systematically Deriving Defence Mechanisms from Functional Requirements of Cyber-Physical Systems

The threats faced by cyber-physical systems~(CPSs) in critical infrastructure have motivated the development of different attack detection mechanisms, such as those that monitor for violations of invariants, i.e. properties that always hold in normal ...

SESSION: Session 2: Detection and Diagnosis for CPS
research-article
Challenges in Machine Learning based approaches for Real-Time Anomaly Detection in Industrial Control Systems

Data-centric approaches are becoming increasingly common in the creation of defense mechanisms for critical infrastructure such as the electric power grid and water treatment plants. Such approaches often use well-known methods from machine learning and ...

research-article
PROS2E, a Probabilistic Representation of Safety and Security Events for Diagnosis

The recent and increasing interconnection of industrial systems with information technologies creates a new paradigm in which new challenges arise. Being able to provide an explanation when accidents and attacks strike the system is one of them. This ...

SESSION: Session 3: Resilience for CPS Scenarios
research-article
Evaluating Cascading Impact of Attacks on Resilience of Industrial Control Systems: A Design-Centric Modeling Approach

A design-centric modeling approach was proposed to model the behaviour of the physical processes controlled by Industrial Control Systems (ICS) and study the cascading impact of data-oriented attacks. A threat model was used as input to guide the ...

research-article
DecIED: Scalable k-Anonymous Deception for IEC61850-Compliant Smart Grid Systems

As demonstrated by the past real-world incidents, sophisticated attackers targeting our critical infrastructure may be hiding in the system, perhaps at this moment, in order to collect information and prepare for massive attacks. If an attacker is ...

Contributors
  • University of Malaga

Recommendations

Acceptance Rates

Overall Acceptance Rate33of113submissions,29%
YearSubmittedAcceptedRate
CPSS '1824625%
CPSS '17351029%
CPSS '1628829%
CPSS '1526935%
Overall1133329%