Main Page

ASIACCS 2017

ASIACCS 2017 Workshops

CCS 2016

CCS 2016
Workshops

CODASPY 2017

CODASPY 2017 Workshops

SACMAT 2017

WiSec 2016

Compilation Author Index

ACM SIGSAC Membership Application

CPSS'17 Table of Contents

ACM CPSS 2017 Chairs' Welcome
Jianying Zhou (SUTD, Singapore)

Ernesto Damiani (KUSTAR, UAE)

ACM CPSS 2017 Workshop Organization


Keynote 1

On the Disappearing Boundary Between Digital, Physical, and Social Spaces - Who, What, Where and When? (Page 1)
Bashar Nuseibeh (The Open University & Lero)

Session 1: Threat Modeling for CPS

Cyber-Physical System Discovery - Reverse Engineering Physical Processes (Page 3)
Alexander Winnicki (Hamburg University of Technology)

Marina Krotofil (Honeywell Industrial Cyber Security Lab)

Dieter Gollmann (Hamburg University of Technology)

Secure 3D Printing: Reconstructing and Validating Solid Geometries using Toolpath Reverse Engineering (Page 15)
Nektarios Georgios Tsoutsos (New York University)

Homer Gamil (New York University Abu Dhabi)

Michail Maniatakos (New York University Abu Dhabi)

(Return to Top)

Session 2: Data Security and Privacy for CPS

Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay (Page 21)
Gareth Haken (Royal Holloway University of London)

Konstantinos Markantonakis (Royal Holloway University of London)

Iakovos Gurulian (Royal Holloway University of London)

Carlton Shepherd (Royal Holloway University of London)

Raja Naeem Akram (Royal Holloway University of London)

Detecting Phishing Websites using Automation of Human Behavior (Page 33)
Routhu Srinivasa Rao (National Institute of Technology)

Alwyn R. Pais (National Institute of Technology)

A Cross-Layer Key Establishment Model for Wireless Devices in Cyber-Physical Systems (Page 43)
Yuexin Zhang (Deakin University)

Yang Xiang (Deakin University)

Xinyi Huang (Fujian Normal University)

(Return to Top)

Keynote 2

Cyber Security of the Autonomous Ship (Page 55)
Sokratis K. Katsikas (Norwegian University of Science and Technology)

(Return to Top)

Session 3: IoT Security

SIPHON: Towards Scalable High-Interaction Physical Honeypots (Page 57)
Juan Guarnizo (Singapore University of Technology and Design)

Amit Tambe (Singapore University of Technology and Design)

Suman Sankar Bhunia (Singapore University of Technology and Design)

Martín Ochoa (Singapore University of Technology and Design)

Nils Ole Tippenhauer (Singapore University of Technology and Design)

Asaf Shabtai (Singapore University of Technology and Design)

Yuval Elovici (Singapore University of Technology and Design & Ben Gurion University)

ViotSOC: Controlling Access to Dynamically Virtualized IoT Services using Service Object Capability (Page 69)
Hajoon Ko (Harvard University)

Jiong Jin (Swinburne University of Technology)

Sye Loong Keoh (University of Glasgow)

(Return to Top)

Session 4: Attack Defense for CPS

A Functional Co-Design towards Safe and Secure Vehicle Platooning (Page 81)
Jiafa Liu (University of Michigan-Dearborn)

Di Ma (University of Michigan-Dearborn)

Andre Weimerskirch (Lear Corporation)

Haojin Zhu (Shanghai Jiao Tong University)

Towards Improving Data Validity of Cyber-Physical Systems through Path Redundancy (Page 91)
Zhiyuan Zheng (Texas A & M University)

A. L. Narasimha Reddy (Texas A & M University)

Spatio-Temporal Correlations in Cyber-Physical Systems: A Defense Against Data Availability Attacks (Page 103)
Biplab Sikdar (National University of Singapore)