Science of Security

A body of knowledge containing laws, axioms and provable theories relating to some aspect of system security.
event

Visible to the public  ACM CCS 2020 - Virtual
Nov 09, 2020 7:00 am - Nov 13, 2020 6:00 pm EST

ACM Conference on Computer and Communications Security (ACM CCS 2020)

The ACM Conference on Computer and Communications Security (CCS) is the flagship annual conference of the Special Interest Group on Security, Audit and Control (SIGSAC) of the Association for Computing Machinery (ACM). The conference brings together information security researchers, practitioners, developers, and users from all over the world to explore cutting-edge ideas and results. It provides an environment to conduct intellectual discussions.

event

Visible to the public  GameSec 2020 (Online)
Oct 28, 2020 7:00 am - Oct 30, 2020 6:00 pm EDT

11th Conference on Decision and Game Theory for Security (GameSec 2020)

Modern societies are becoming dependent on information, automation, and communication technologies more than ever. Managing the security of the emerging systems, many of them safety critical, poses significant challenges.

event

Visible to the public  HoTSoS 2020 - Virtual
Sep 22, 2020 7:00 am - Sep 23, 2020 6:00 pm CDT

7th Annual Hot Topics in the Science of Security (HoTSoS) Symposium

September 22-24, 2020 | Virtually hosted by the University of Kansas | https://cps-vo.org/group/hotsos

event

Visible to the public  Science of Security Lablet Quarterly Meeting (CMU)
Jul 14, 2015 8:00 am - Jul 15, 2015 3:00 pm EDT

Quarterly SoS Meeting at Carnegie Mellon University

The Science of Security Quarterly Meeting at Carnegie Mellon University will be held on Tuesday, July 14 and Wednesday, July 15, 2015. The meeting for both days will take place on the CMU Campus in Gates Hillman Center Room 6115.

event

Visible to the public  NIST CPS PWG
Jun 30, 2014 1:00 pm - 2:30 pm EDT

NIST Cyber-Physical Systems Public Working Group

What are Cyber-Physical Systems or CPS?

  • Is a CPS any engineered system with a microprocessor?
  • Do all CPS need to be connected to the internet?
  • Are there a set of basic functions and architectural elements common to all CPS?

You are invited to join us in answering these questions and charting the path to the future.

event

Visible to the public  CPS Week 2014
Apr 14, 2014 8:00 am - Apr 17, 2014 6:00 pm EDT

The CPSWeek brings together five leading conferences - HSCC, ICCPS, IPSN, HiCoNS, RTAS - as well as several workshops and tutorials on various aspects on the research and development of cyber-physical systems: Embedded Systems, Hybrid Systems, Real-Time and Sensor Networks.

forum

Visible to the public IEEE SMARTCOMP 2021: Call for Participation

                   IEEE SMARTCOMP 2021 .::. Call for Participation .::.
*********************************************************************************************************************
The 7th IEEE International Conference on Smart Computing (SMARTCOMP 2021), August 23-27, 2021.

Due to uncertainties associated with the pandemic, IEEE SMARTCOMP 2021 will be held as a virtual conference.

https://www.smart-comp.info

file

Visible to the public Resiliency-Aware Deployment of SDN in Smart Grid SCADA: A Formal Synthesis Model

The supervisory control and data acquisition (SCADA) network in a smart grid must be reliable and efficient to transmit real-time data to the controller, especially when the system is under contingencies or cyberattacks. Introducing the features of software-defined networks (SDN) into a SCADA network helps in better management of communication and deployment of novel grid control operations.

file

Visible to the public DDAF: Deceptive Data Acquisition Framework against Stealthy Attacks in Cyber-Physical Systems

Cyber-physical systems (CPSs) and the Internet of Things (IoT) are converging towards a hybrid platform that is becoming ubiquitous in all modern infrastructures. The massive deployment of CPS requires comprehensive, secure, and reliable communication. The integration of complex and heterogeneous systems makes enormous space for the adversaries to get into the network and inject malicious data. To obfuscate and mislead the attackers, we propose DDAF, a deception defense-based data acquisition framework for a hierarchical communication network of CPSs.

file

Visible to the public Secure Control in Partially Observable Environments to Satisfy LTL Specifications

This paper studies the synthesis of control

policies for an agent that has to satisfy a temporal logic

specification in a partially observable environment, in

the presence of an adversary. The interaction of the

agent (defender) with the adversary is modeled as a partially

observable stochastic game. The goal is to generate

a defender policy to maximize satisfaction of a given

temporal logic specification under any adversary policy.

The search for policies is limited to the space of finite