Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3605758acmconferencesBook PagePublication PagesccsConference Proceedingsconference-collections
CPSIoTSec '23: Proceedings of the 5th Workshop on CPS&IoT Security and Privacy
ACM2023 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CCS '23: ACM SIGSAC Conference on Computer and Communications Security Copenhagen Denmark 26 November 2023
ISBN:
979-8-4007-0254-9
Published:
26 November 2023
Sponsors:
Next Conference
October 13 - 17, 2025
Taipei , Taiwan
Reflects downloads up to 13 Nov 2024Bibliometrics
Skip Abstract Section
Abstract

We are delighted to extend a warm welcome to the 2023 Joint Workshop on CPS & IoT Security and Privacy (CPSIoTSec'23). The Joint Workshop on CPS&IoT Security and Privacy is the result of the merger of the "Workshop on Cyber-Physical Systems Security and Privacy" and the "Workshop on the Internet of Things Security and Privacy" previously organized annually in conjunction with ACM Conference on Computer and Communications Security.

The security landscape of Cyber-Physical Systems (CPS) and IoT devices is challenging from several perspectives. This year's workshop continues its tradition to provide a collaborative forum that unites academia, industry experts, and governmental entities.

Skip Table Of Content Section
SESSION: Session 1: Assessment and Mitigation Strategies
research-article
Firmulti Fuzzer: Discovering Multi-process Vulnerabilities in IoT Devices with Full System Emulation and VMI

With the growth of Internet of Things devices, the number and complexity of these devices are increasing rapidly. Nevertheless, many IoT products are developed without sufficient consideration for security, leaving them vulnerable to exploitation by ...

research-article
Open Access
Water Risk-Proofed: Risk Assessment in Water Desalination

Desalination plants, heavily reliant on Industrial Control Systems (ICS), have emerged as increasingly vital resources in the wake of escalating global water scarcity. This raises an urgent need to prioritize their security, calling for the ...

research-article
Open Access
Remote Attestation of IoT Devices using Physically Unclonable Functions: Recent Advancements and Open Research Challenges

In the past few years, the diffusion of IoT devices used in everyday life has skyrocketed. From wearable devices to smart home appliances, these gadgets are increasingly exposed to the Internet or to open networks. This means that it is necessary to ...

extended-abstract
From DDoSim to DDoSimQ: Enhancing DDoS Attack Simulations Through Full System Emulation

DDoSimQ, a simulation testbed for replicating intricate botnet DDoS attacks, is introduced. Building on the foundation of DDoSim (a testbed that uses Docker containers and the NS-3 simulator for IoT botnet DDoS attack simulations), DDoSimQ extends its ...

SESSION: Session 2: Adversarial Exploitation and Compiler Insights in Real-World Systems
research-article
Towards Adversarial Process Control on Inertial Sensor Systems with Physical Feedback Side Channels

Real-world process control requires continuous sensor measurements and automatic control of the environment. Typical process control systems consist of three main components: controllers functioning as the system's "brain'', sensors acting as ...

research-article
Open Access
Brain-Hack: Remotely Injecting False Brain-Waves with RF to Take Control of a Brain-Computer Interface

The promise of Brain-Computer Interfaces (BCIs) is counterbalanced by concerns about vulnerabilities. Recent studies have revealed that EEG-based BCIs are susceptible to security breaches. However, current attack approaches are challenging to execute in ...

short-paper
Open Access
The Internet of Insecure Cows - A Security Analysis of Wireless Smart Devices Used for Dairy Farming

IoT devices are becoming increasingly common in the world of agriculture with farmers now relying on technology to keep their businesses running. From crop management and greenhouse automation to entirely autonomous milking parlours, technology is being ...

short-paper
SweetCam: an IP Camera Honeypot

The utilization of the Internet of Things (IoT) as an attack surface is nowadays a fact. Taking IP cameras as a use-case, they have been targeted to a great extent mainly due to the absence of authentication, the utilization of weak, in terms of ...

short-paper
Towards PLC-Specific Binary Analysis Tools: An Investigation of Codesys-Compiled PLC Software Applications

Critical infrastructures are controlled by industrial control systems. Such systems are primarily operated by Programmable Logic Controllers (PLC). In recent years, PLC vendors have been moving towards commercial-off-the-shelf components and operating ...

SESSION: Session 3: Device Identification and Anonymization
short-paper
Open Access
Granular IoT Device Identification Using TF-IDF and Cosine Similarity

Internet of things (IoT) devices are becoming more prevalent in home environments and are shown to be generally insecure. There have been many previous studies looking to identify unknown IoT devices on networks. To truly secure a network however, there ...

short-paper
Privacy through Diffusion: A White-listing Approach to Sensor Data Anonymization

Generative models have shown great promise in synthesizing high-quality time-series data that resemble the sensor data generated by mobile and IoT devices, but do not reveal the user's private attributes. These synthesized data can be treated as the ...

Contributors
  • Chalmers University of Technology
  • University of California, San Diego
Index terms have been assigned to the content through auto-classification.
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations