It is our great pleasure to welcome you to CPSS 2020, the sixth ACM Cyber-Physical System Security Workshop, co-located with ACM AsiaCCS 2020 and held online on 6 October 2020.
The call for papers attracted 17 submissions from Asia, Europe, and the United States, a good number of submissions considering the multiples issues that the COVID-19 pandemic has caused in the worldwide. Submissions were evaluated based on their significance, novelty, technical quality and relevance for the field. The review process was double-blinded. The program committee members have put in a significant effort in evaluating the papers, and most of the papers received three reviews with a high value in the ensued discussion. A total of six papers were finally accepted for presentation at the workshop, resulting in an acceptance rate of 35,3%.
In addition to the six technical presentations, a keynote talk by a prominent researcher in the CPS security area has been included in the workshop program. Our keynote speaker is Prof. Nils Ole Tippenhauer, of CISPA, Germany, and the title of his talk is "Trust, but Verify? Perspectives On Industrial Device Security".
Proceeding Downloads
Trust, But Verify? Perspectives On Industrial Device Security
Industrial Control System (ICS) host devices such as Programable Logic Controllers (PLCs) are widely using proprietary realtime operating systems with little or no support for Cybersecurity features. Even security solutions widely used in mainstream ...
Feasibility of PUF-Based Authentication on ATtiny Devices with Off-the-Shelf SRAM
With the proliferation of connected IoT devices over the last decade, security has become one of the most pronounced areas of technical concern. Furthermore, the most important challenge being device authentication and trust management of resource ...
Towards Systematically Deriving Defence Mechanisms from Functional Requirements of Cyber-Physical Systems
The threats faced by cyber-physical systems~(CPSs) in critical infrastructure have motivated the development of different attack detection mechanisms, such as those that monitor for violations of invariants, i.e. properties that always hold in normal ...
Challenges in Machine Learning based approaches for Real-Time Anomaly Detection in Industrial Control Systems
Data-centric approaches are becoming increasingly common in the creation of defense mechanisms for critical infrastructure such as the electric power grid and water treatment plants. Such approaches often use well-known methods from machine learning and ...
PROS2E, a Probabilistic Representation of Safety and Security Events for Diagnosis
The recent and increasing interconnection of industrial systems with information technologies creates a new paradigm in which new challenges arise. Being able to provide an explanation when accidents and attacks strike the system is one of them. This ...
Evaluating Cascading Impact of Attacks on Resilience of Industrial Control Systems: A Design-Centric Modeling Approach
A design-centric modeling approach was proposed to model the behaviour of the physical processes controlled by Industrial Control Systems (ICS) and study the cascading impact of data-oriented attacks. A threat model was used as input to guide the ...
DecIED: Scalable k-Anonymous Deception for IEC61850-Compliant Smart Grid Systems
As demonstrated by the past real-world incidents, sophisticated attackers targeting our critical infrastructure may be hiding in the system, perhaps at this moment, in order to collect information and prepare for massive attacks. If an attacker is ...