Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3560826acmconferencesBook PagePublication PagesccsConference Proceedingsconference-collections
CPSIoTSec '22: Proceedings of the 4th Workshop on CPS & IoT Security and Privacy
ACM2022 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security Los Angeles CA USA 7 November 2022
ISBN:
978-1-4503-9876-3
Published:
07 November 2022
Sponsors:
Next Conference
October 13 - 17, 2025
Taipei , Taiwan
Reflects downloads up to 13 Nov 2024Bibliometrics
Skip Abstract Section
Abstract

It gives us great honor to welcome you to the 2022 Joint Workshop on CPS & IoT Security and Privacy (CPSIoTSec'22). The Joint Workshop on CPS&IoT Security and Privacy is the result of the merger of the Workshop on Cyber-Physical Systems Security and Privacy (CPS-SPC) and Workshop on the Internet of Things Security and Privacy (IoTS&P) previously organized annually in conjunction with ACM Conference on Computer and Communications Security.

Skip Table Of Content Section
SESSION: Session 1: Industrial Control and Crypto (graphy, not currency)
research-article
Security Analysis of Vendor Implementations of the OPC UA Protocol for Industrial Control Systems

The OPC UA protocol is an upcoming de-facto standard for building Industry 4.0 processes in Europe, and one of the few industrial protocols that promises security features to prevent attackers from manipulating and damaging critical infrastructures. ...

research-article
Single-Server Delegation of Small-Exponent Exponentiation from Quasilinear-Time Clients and Applications

Motivated by reducing the cost of public-key encryption on resource-constrained devices, we investigate the problem of delegating operations in cryptography schemes from client devices that only perform quasilinear-time or lower-order computations (e.g.,...

SESSION: Session 2: Reboots in the air
short-paper
Open Access
Secure Reboots for Real-Time Cyber-Physical Systems

Cyber-Physical Systems (CPS) such as industrial control systems, automobiles, and medical devices often consist of applications with real-time properties. Due to the safety-critical nature of the application domain, multiple security and fault tolerance ...

research-article
Open Access
RoSym: Robust Symmetric Key Based IoT Software Upgrade Over-the-Air

Internet of Things (IoT) firmware upgrade has turned out to be a challenging task with respect to security. While Over-The-Air (OTA) software upgrade possibility is an essential feature to achieve security, it is also most sensitive to attacks and lots ...

SESSION: Session 3B: Satellites and ML?!
short-paper
Public Access
Stargaze: A LEO Constellation Emulator for Security Experimentation

Low-earth orbit (LEO) satellite constellations are a special type of cyber-physical systems. Their meteoric rise has led to the proposition of many novel use cases and applications. Recent research has also highlighted the broad and unique threat ...

short-paper
CloudPAD: Managed Anomaly Detection for ICS

Modern attacks on Industrial Control Systems (ICSs) are the result of several colliding circumstances: historically insecure communication protocols, increased ICS connectivity, and the rise of state-sponsored attackers. Extensive research has been ...

short-paper
Public Access
Real-Time Scheduling of TrustZone-enabled DNN Workloads

Limited resources in embedded devices often hinder the execution of computation-heavy machine learning processes. Running deep neural network (DNN) workloads while preserving the integrity of the model parameters and without compromising temporal ...

Contributors
  • University of California, San Diego
  • University of Malaga
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations