skip to main content
10.1145/3626205acmconferencesBook PagePublication Pagesasia-ccsConference Proceedingsconference-collections
CPSS '24: Proceedings of the 10th ACM Cyber-Physical System Security Workshop
ACM2024 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ASIA CCS '24: ACM Asia Conference on Computer and Communications Security Singapore Singapore 2 July 2024
ISBN:
979-8-4007-0420-8
Published:
01 July 2024
Sponsors:

Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
SESSION: Keynotes
short-paper
Open Access
Keynote: A Tale of Two Industroyers: It was the Season of Darkness

In this talk, we discuss the first two known pieces of malware that attempted to create power grid blackouts. While previous research had described the malware at a high level, in this talk, we take a deep dive into the payload targeting the operational ...

short-paper
Free
Keynote: Dissecting the software supply chain of modern industrial control systems

Recent years have been pivotal in the field of Industrial Control Systems (ICS) security, with a large number of high-profile attacks exposing the lack of a design-for-security initiative in ICS. The evolution of ICS abstracting the control logic to a ...

SESSION: ML/AI-driven CPS Security
research-article
Open Access
WaXAI: Explainable Anomaly Detection in Industrial Control Systems and Water Systems

An Industrial Control System (ICS) plays a vital role in controlling and managing industrial processes. ICS predominantly operates without human supervision. This (mostly) autonomous role makes them an attractive target for adversaries. In recent years, ...

research-article
Free
Building Detection-Resistant Reconnaissance Attacks Based on Adversarial Explainability

The growing popularity of Internet-of-Things devices makes them a desired target for malicious actors. Most attacks start with a reconnaissance phase where the attacker gathers information about the services running on the device, the open ports, and any ...

research-article
Open Access
SRI: A Simple Rule Induction Method for improving resiliency of DNN based IDS against adversarial and zero-day attacks

Adversarial machine learning (ML) has demonstrated vulnerabilities of neural network methods against well-crafted perturbations when added to perfectly acceptable samples. These vulnerabilities get exacerbated when neural network methods are deployed as ...

SESSION: Cryptography-based CPS Security
research-article
Free
Pixel Complexity Sorting Embedding for Reversible Data Hiding Based on Elastic net Predictor

Reversible data hiding techniques have increasingly garnered attention from researchers in the field of information security due to their capacity to recover the original image non-destructively and their substantial embedding capacity. Over recent years,...

research-article
Open Access
X2065: Lightweight Key Exchange for the Internet of Things

The Internet is rapidly transitioning from a network of personal computers, laptops and mobile phones to a network that will soon connect 32 billion smart devices (or "things"), many of which are extremely constrained in terms of computational resources ...

SESSION: Cybersecurity and Safety in CPS
research-article
Open Access
Air-Bus Hijacking: Silently Taking over Avionics Systems

This paper investigates cyber-physical attacks on avionics data buses, specifically focusing on the ARINC 429 protocol. The objective is to demonstrate how message injection, modification, and deletion attacks can be executed, enabling an attacker to ...

research-article
Free
K-RAPID: A Formal Executable Semantics of the RAPID Robot Programming Language

Industrial robots are widely used in industrial production as mechanical devices. It is essential to guarantee that their control software operates safely and properly, as any functional or security-related defects may lead to serious incidents. However, ...

SESSION: CPS Security Frameworks and Exercises
research-article
Free
DRACE: A Framework for Evaluating Anomaly Detectors for Industrial Control Systems

The detection of process anomalies is a critical step in defending a physical plant against cyber-attacks. We propose a framework named DRACE that includes a set of metrics to evaluate the effectiveness of anomaly detectors, referred to as Intrusion ...

research-article
Free
Mobile_FL: A streamlined FL framework for process optimisation via client clustering using rough c-means algorithm

Currently, Federated Learning is one of the most widely accepted distributed learning frameworks for privacy-sensitive applications. Despite the popularity gained, FL frameworks struggle to perform well in terms of accuracy and model convergence for ...

research-article
Open Access
Capture The Industrial Flag: Lessons from hosting an ICS cybersecurity exercise

Industrial Control Systems (ICS) are integral to critical infrastructure, necessitating advanced cybersecurity training. Addressing the urgent need for specialized cybersecurity training, this paper details the UK's first Capture-The-Flag (CTF) event ...

Contributors
  • Singapore University of Technology and Design

Recommendations

Acceptance Rates

CPSS '24 Paper Acceptance Rate 10 of 22 submissions, 45%;
Overall Acceptance Rate 43 of 135 submissions, 32%
YearSubmittedAcceptedRate
CPSS '24221045%
CPSS '1824625%
CPSS '17351029%
CPSS '1628829%
CPSS '1526935%
Overall1354332%