Visible to the public CfP: 3rd Annual ACM Workshop on Cyber-Physical Systems Security and Privacy (CPS-SPC)Conflict Detection Enabled

No replies
Anonymous
Anonymous's picture

CALL FOR PAPERS

3rd Annual ACM Workshop on Cyber-Physical Systems Security and Privacy (CPS-SPC)

In Conjunction with the ACM Conference on Computer and Communications Security (CCS)

Dallas, Texas, USA | November 03, 2017 | https://sites.google.com/site/cpsspc2017/home

Important Dates

  • Paper Submission Deadline: August 4, 2017 (Anywhere on Earth time)
  • Notification of Acceptance/Rejection: September 4, 2017
  • Camera Ready Papers Due: September 17, 2017

Cyber-Physical Systems (CPS) integrate computing and communication capabilities with monitoring and control of entities in the physical world. These systems are usually composed of a set of networked agents, including sensors, actuators, control processing units, and communication devices. While some forms of CPS are already in use, the widespread growth of wireless embedded sensors and actuators is creating several new applications in areas such as medical devices, autonomous vehicles, and smart infrastructure, and is increasing the role that the information infrastructure plays in existing control systems such as in the process control industry or the power grid.

Many CPS applications are safety-critical: their failure can cause irreparable harm to the physical system under control, and to the people who depend, use or operate it. In particular, critical cyber-physical infrastructures such as electric power generation, transmission and distribution grids, oil and natural gas systems, water and waste-water treatment plants, and transportation networks play a fundamental and large-scale role in our society. Their disruption can have a significant impact on individuals, and nations at large. Securing these CPS infrastructures is, therefore, vitally important.

Similarly because many CPS systems collect sensor data non-intrusively, users of these systems are often unaware of their exposure. Therefore, in addition to security, CPS systems must be designed with privacy considerations.

To address these issues, we invite original research papers on the security and/or privacy of Cyber-Physical Systems. We seek submissions from multiple interdisciplinary backgrounds tackling security and privacy issues in CPS, including but not limited to:

  • mathematical foundations for secure CPS
  • control theoretic approaches to secure CPS
  • high assurance security architectures for CPS
  • security and resilience metrics for CPS
  • metrics and risk assessment approaches for CPS
  • privacy in CPS
  • network security for CPS
  • game theory applied to CPS security
  • security of embedded systems, IoT and real-time systems in the context of CPS
  • human factors and humans in the loop
  • understanding dependencies among security, reliability and safety in CPS
  • economics of security and privacy in CPS
  • intrusion detection in CPS
  • model-based security systems engineering
  • experimental insights from real-world CPS or CPS testbeds

CPS domains of interest include but are not limited to:

  • health care and medical devices
  • manufacturing
  • industrial control systems
  • SCADA systems
  • Robotics
  • smart building environments
  • unmanned aerial vehicles (UAVs)
  • autonomous vehicles
  • transportation systems and networks

Also of interest will be papers that can point the research community to new research directions, and those that can set research agendas and priorities in CPS security and privacy.

Submitted papers can be up to 12 pages including appendices and references. Submissions must use the ACM SIG Proceedings Templates (available at the ACM website) in double-column format with a font no smaller than 9 point. Only PDF files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Accepted papers will be published by the ACM Press and/or the ACM Digital Library.

Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Each accepted paper must be presented by one registered author. Submissions not meeting these guidelines risk immediate rejection. For questions about these policies, please contact the chairs.

Organisation

Steering Committee

  • Rakesh Bobba, Oregon State University, USA
  • Alvaro Cardenas, University of Texas at Dallas, USA
  • Roshan Thomas, MITRE Corporation

Program Chairs

  • Rakesh Bobba, Oregon State University, USA
  • Awais Rashid, Lancaster University, UK

Program Committee

  • Cristina Alcaraz, Universidad de Malaga, Spain
  • Magnus Almgren, Chalmers University of Technology, Sweden
  • Pauline Anthonysamy, Google
  • Raheem Beyah, Georgia Institute of Technology, USA
  • Alvaro Cardenas, University of Texas at Dallas, USA
  • Gabriela Ciocarlie, SRI International, USA
  • Simon Foley, IMT-Atlantique, France
  • Sylvain Frey, University of Southampton, UK
  • Ben Green, Fujistu/Lancaster University, UK
  • Adam Hahn, Washington State University, USA
  • Wouter Joosen, KU Leuven, Belgium
  • Marina Krotofil, Honeywell Industrial Cyber Security Lab
  • Michail Maniatakos, New York University Abu Dhabi, UAE
  • Daisuke Mashima, Advanced Digital Sciences Center, Singapore
  • Aditya Mathur, Singapore University of Technology and Design, Singapore
  • Sibin Mohan, University of Illinois at Urbana-Champaign, USA
  • Xinming Ou, University of South Florida, USA
  • Jose M. Such, King's College London, UK
  • Roshan Thomas, MITRE, USA
  • Nils Ole Tippenhauer, Singapore University of Technology and Design, Singapore
  • Claire Vishik, Intel Corporation, UK
  • Avishai Wool, Tel Aviv University, Israel
  • Quanyan Zhu, New York University, USA