CPSIoTSec 2023

November 26 (Sunday), 2023
Copenhagen, Denmark

Queries: magnus.almgren[at]chalmers.se

NEWS! CPSIoTSec 2024 in Salt Lake City

The 5th Joint Workshop on
CPS & IoT Security and Privacy

In conjunction with the
ACM Conference on Computer and Communications Security 2023


The Joint Workshop on CPS&IoT Security and Privacy (CPSIoTSec) is the result of the merger of the Workshop on Cyber-Physical Systems Security and Privacy (CPS-SPC) and Workshop on the Internet of Things Security and Privacy (IoTS&P) previously organized annually in conjunction with ACM Conference on Computer and Communications Security.


The Workshop on CPS&IoT Security and Privacy (CPSIoTSec 2023) invites academia, industry, and governmental entities to submit:

We seek submissions from multiple interdisciplinary backgrounds tackling security and privacy issues in CPS&IoT, including but not limited to:

Also of interest will be papers that can point the research community to new research directions, and those that can set research agendas and priorities in CPS/IoT security and privacy. There will be a best paper award.


Best paper award 2023:
   Brain-Hack: Remotely Injecting False Brain-Waves with RF to Take Control of a Brain-Computer Interface. Alexandre Armengol-Urpi, Reid Kovacs, and Sanjay E. Sarmahttps://dl.acm.org/doi/10.1145/3605758.3623497

9:00 - 9:15 Opening Remarks (Magnus Almgren)
9:15 - 10:00 Keynote 1: Security and privacy challenges for next generation communication and computational infrastructures and applications, Maria Kihl (Lund University, Sweden)
10:00 - 10:30 Break
10:30 - 12:20 Session 1: Assessment and Mitigation Strategies. Session Chair: Shahid Raza
(full paper) Firmulti Fuzzer: Discovering Multi-process Vulnerabilities in IoT Devices with Full System Emulation and VMI
(full paper) Water Risk-Proofed: Risk Assessment in Water Desalination
(full paper) Remote Attestation of IoT Devices using Physically Unclonable Functions: Recent Advancements and Open Research Challenges
(demo) From DDoSim to DDoSimQ: Enhancing DDoS Attack Simulation Through Full System Emulation
12:20 - 13:30 Lunch Break
13:30 - 15:30 Session 2: Adversarial Exploitation and Compiler Insights in Real-World Systems. Session Chair: Charalambos Konstantinou
(full paper) Towards Adversarial Process Control on Inertial Sensor Systems with Physical Feedback Side Channels
(full paper) Brain-Hack: Remotely Injecting False Brain-Waves with RF to Take Control of a Brain-Computer Interface
(short paper) The Internet of Insecure Cows - A security analysis of wireless smart devices used for dairy farming
(short paper) SweetCam: an IP Camera Honeypot
(short paper) Towards PLC-specific Binary Analysis Tools: An Investigation of Codesys-compiled PLC Software Applications
15:30 - 16:00 Break
16:00 - 16:45 Keynote 2: IoT and Web, Friend or Foe? Security and Privacy of Internet of Things Apps, Musard Balliu (KTH, Sweden)
16:45 - 16:50 Short Break
16:50 - 17:30 Session 3: Device Identification and Anonymization. Session Chair: Emil C. Lupu
(short paper) Granular IoT Device Identification Using TF-IDF and Cosine Similarity
(short paper) Privacy through Diffusion: A White-listing Approach to Sensor Data Anonymization
17:30 - 17:45 Finish best paper voting process
17:45 - 18:00 Best paper announcement, Closing Remarks (Magnus Almgren)

Submission Guidelines

Submissions include long papers (12 pages), short papers (6 pages), or 1-page abstracts:

Submitted papers can be up to 12 or 6 pages excluding appendices and references, and should provide enough details to enable reproducibility. All submitted papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references, for double blind reviews. Submissions must use the ACM SIG Proceedings Templates (see https://www.acm.org/publications/proceedings-template, with a simpler version here: https://github.com/acmccs/format). Only PDF files will be accepted.

Accepted papers will be published by the ACM Press and/or the ACM Digital Library. We expect all authors to consider diversity and inclusion, especially when preparing their own submission (see https://www.acm.org/diversity-inclusion/about). Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Each accepted paper must be presented by a registered author. Submissions not meeting these guidelines risk immediate rejection. For questions about these policies, please contact the chairs.

Important Dates

Program Chairs

Technical Program Committee

Steering Committee

Publicity Chair

Past Workshop