November 26 (Sunday), 2023
Copenhagen, Denmark
Queries: magnus.almgren[at]chalmers.se
NEWS! CPSIoTSec 2024 in Salt Lake City
The 5th Joint Workshop on
CPS & IoT Security and Privacy
The Joint Workshop on CPS&IoT Security and Privacy (CPSIoTSec) is the result of the merger of the Workshop on Cyber-Physical Systems Security and Privacy (CPS-SPC) and Workshop on the Internet of Things Security and Privacy (IoTS&P) previously organized annually in conjunction with ACM Conference on Computer and Communications Security.
The Workshop on CPS&IoT Security and Privacy (CPSIoTSec 2023) invites academia, industry, and governmental entities to submit:
We seek submissions from multiple interdisciplinary backgrounds tackling security and privacy issues in CPS&IoT, including but not limited to:
Also of interest will be papers that can point the research community to new research directions, and those that can set research agendas and priorities in CPS/IoT security and privacy. There will be a best paper award.
Best paper award 2023:
Brain-Hack: Remotely Injecting False Brain-Waves with RF to Take Control of a Brain-Computer Interface. Alexandre Armengol-Urpi, Reid Kovacs, and Sanjay E. Sarma https://dl.acm.org/doi/10.1145/3605758.3623497
9:00 - 9:15 | Opening Remarks (Magnus Almgren) | |
9:15 - 10:00 | Keynote 1: Security and privacy challenges for next generation communication and computational infrastructures and applications, Maria Kihl (Lund University, Sweden) | |
10:00 - 10:30 | Break | |
10:30 - 12:20 | Session 1: Assessment and Mitigation Strategies. Session Chair: Shahid Raza | |
(full paper) | Firmulti Fuzzer: Discovering Multi-process Vulnerabilities in IoT Devices with Full System Emulation and VMI | |
(full paper) | Water Risk-Proofed: Risk Assessment in Water Desalination | |
(full paper) | Remote Attestation of IoT Devices using Physically Unclonable Functions: Recent Advancements and Open Research Challenges | |
(demo) | From DDoSim to DDoSimQ: Enhancing DDoS Attack Simulation Through Full System Emulation | |
12:20 - 13:30 | Lunch Break | |
13:30 - 15:30 | Session 2: Adversarial Exploitation and Compiler Insights in Real-World Systems. Session Chair: Charalambos Konstantinou |
|
(full paper) | Towards Adversarial Process Control on Inertial Sensor Systems with Physical Feedback Side Channels | |
(full paper) | Brain-Hack: Remotely Injecting False Brain-Waves with RF to Take Control of a Brain-Computer Interface | |
(short paper) | The Internet of Insecure Cows - A security analysis of wireless smart devices used for dairy farming | |
(short paper) | SweetCam: an IP Camera Honeypot | |
(short paper) | Towards PLC-specific Binary Analysis Tools: An Investigation of Codesys-compiled PLC Software Applications | |
15:30 - 16:00 | Break | |
16:00 - 16:45 | Keynote 2: IoT and Web, Friend or Foe? Security and Privacy of Internet of Things Apps, Musard Balliu (KTH, Sweden) | |
16:45 - 16:50 | Short Break | |
16:50 - 17:30 | Session 3: Device Identification and Anonymization. Session Chair: Emil C. Lupu | |
(short paper) | Granular IoT Device Identification Using TF-IDF and Cosine Similarity | |
(short paper) | Privacy through Diffusion: A White-listing Approach to Sensor Data Anonymization | |
17:30 - 17:45 | Finish best paper voting process | |
17:45 - 18:00 | Best paper announcement, Closing Remarks (Magnus Almgren) |
Submissions include long papers (12 pages), short papers (6 pages), or 1-page abstracts:
Submitted papers can be up to 12 or 6 pages excluding appendices and references, and should provide enough details to enable reproducibility. All submitted papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references, for double blind reviews. Submissions must use the ACM SIG Proceedings Templates (see https://www.acm.org/publications/proceedings-template, with a simpler version here: https://github.com/acmccs/format). Only PDF files will be accepted.
Accepted papers will be published by the ACM Press and/or the ACM Digital Library. We expect all authors to consider diversity and inclusion, especially when preparing their own submission (see https://www.acm.org/diversity-inclusion/about). Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Each accepted paper must be presented by a registered author. Submissions not meeting these guidelines risk immediate rejection. For questions about these policies, please contact the chairs.