- Sponsor:
- sigsac
We are delighted to extend a warm welcome to the 2023 Joint Workshop on CPS & IoT Security and Privacy (CPSIoTSec'23). The Joint Workshop on CPS&IoT Security and Privacy is the result of the merger of the "Workshop on Cyber-Physical Systems Security and Privacy" and the "Workshop on the Internet of Things Security and Privacy" previously organized annually in conjunction with ACM Conference on Computer and Communications Security.
The security landscape of Cyber-Physical Systems (CPS) and IoT devices is challenging from several perspectives. This year's workshop continues its tradition to provide a collaborative forum that unites academia, industry experts, and governmental entities.
Proceeding Downloads
Firmulti Fuzzer: Discovering Multi-process Vulnerabilities in IoT Devices with Full System Emulation and VMI
With the growth of Internet of Things devices, the number and complexity of these devices are increasing rapidly. Nevertheless, many IoT products are developed without sufficient consideration for security, leaving them vulnerable to exploitation by ...
Water Risk-Proofed: Risk Assessment in Water Desalination
Desalination plants, heavily reliant on Industrial Control Systems (ICS), have emerged as increasingly vital resources in the wake of escalating global water scarcity. This raises an urgent need to prioritize their security, calling for the ...
Remote Attestation of IoT Devices using Physically Unclonable Functions: Recent Advancements and Open Research Challenges
In the past few years, the diffusion of IoT devices used in everyday life has skyrocketed. From wearable devices to smart home appliances, these gadgets are increasingly exposed to the Internet or to open networks. This means that it is necessary to ...
From DDoSim to DDoSimQ: Enhancing DDoS Attack Simulations Through Full System Emulation
DDoSimQ, a simulation testbed for replicating intricate botnet DDoS attacks, is introduced. Building on the foundation of DDoSim (a testbed that uses Docker containers and the NS-3 simulator for IoT botnet DDoS attack simulations), DDoSimQ extends its ...
Towards Adversarial Process Control on Inertial Sensor Systems with Physical Feedback Side Channels
Real-world process control requires continuous sensor measurements and automatic control of the environment. Typical process control systems consist of three main components: controllers functioning as the system's "brain'', sensors acting as ...
Brain-Hack: Remotely Injecting False Brain-Waves with RF to Take Control of a Brain-Computer Interface
The promise of Brain-Computer Interfaces (BCIs) is counterbalanced by concerns about vulnerabilities. Recent studies have revealed that EEG-based BCIs are susceptible to security breaches. However, current attack approaches are challenging to execute in ...
The Internet of Insecure Cows - A Security Analysis of Wireless Smart Devices Used for Dairy Farming
IoT devices are becoming increasingly common in the world of agriculture with farmers now relying on technology to keep their businesses running. From crop management and greenhouse automation to entirely autonomous milking parlours, technology is being ...
SweetCam: an IP Camera Honeypot
The utilization of the Internet of Things (IoT) as an attack surface is nowadays a fact. Taking IP cameras as a use-case, they have been targeted to a great extent mainly due to the absence of authentication, the utilization of weak, in terms of ...
Towards PLC-Specific Binary Analysis Tools: An Investigation of Codesys-Compiled PLC Software Applications
Critical infrastructures are controlled by industrial control systems. Such systems are primarily operated by Programmable Logic Controllers (PLC). In recent years, PLC vendors have been moving towards commercial-off-the-shelf components and operating ...
Granular IoT Device Identification Using TF-IDF and Cosine Similarity
Internet of things (IoT) devices are becoming more prevalent in home environments and are shown to be generally insecure. There have been many previous studies looking to identify unknown IoT devices on networks. To truly secure a network however, there ...
Privacy through Diffusion: A White-listing Approach to Sensor Data Anonymization
Generative models have shown great promise in synthesizing high-quality time-series data that resemble the sensor data generated by mobile and IoT devices, but do not reveal the user's private attributes. These synthesized data can be treated as the ...
Index Terms
- Proceedings of the 5th Workshop on CPS&IoT Security and Privacy
Recommendations
CPSIoTSec'23: Fifth Workshop on CPS & IoT Security and Privacy
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityThe fifth Workshop on CPS & IoT Security and Privacy is set to take place in Copenhagen, Denmark, on November 26, 2023, in conjunction with the ACM Conference on Computer and Communications Security (CCS'23). This workshop marks the amalgamation of two ...
CPSIoTSec '22: 4th Workshop on CPS & IoT Security and Privacy
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityThere is a rapidly growing interest in the security of cyber-physical systems (CPS) and internet-of-things (IoT) in industry, government and academia. This interest is also reflected in this workshop that from 2019 has been part of the ACM Conference on ...