Applications of CPS technologies essential for the functioning of a society and economy.

New York City, Tampa, FL and Wyoming Selected for Competitive Pilot Programs

Submitted by Site Manager on September 15th, 2015

Dear Colleague,

We would like to cordially invite you to contribute a book chapter to a forthcoming book entitled " Security and Privacy in Cyber-Physical Systems: Foundations and Applications", which will be published by Wiley (https://sites.google.com/site/wileycpsspbook/).

Cyber-physical systems (CPS) are engineered systems that are built from, and depend upon, the seamless integration of computational algorithms and physical components. Advances in CPS will enable capability, adaptability, scalability, resiliency, safety, security, and usability that will far exceed the simple embedded systems of today. CPS are subject to threats stemming from increasing reliance on computer and communication technologies. Security threats exploit the increased complexity and connectivity of critical infrastructure systems, placing the Nation’s security, economy, public safety, and health at risk. CPS blur the lines between infrastructural and personal spaces when they provide convenient access to public services or bridge the gap between personal property and public infrastructure. This blurring is being engineered into the Internet of Things (IoT), an important exponent of CPS. With IoT, personal CPS (like phones, appliances, and automobiles) bearing personal data can reach up into public infrastructures to access services. This connectivity can result in leakage of personal data with attendant privacy concerns. 

    The purpose of the book is to refine an understanding of the key technical, social and legal issues at stake, to understand the range of technical issues affecting hardware and software in infrastructure components, as well as the blending of such systems with personal CPS. This book will present the state of the art and the state of the practice of how to address the following unique security and privacy challenges facing CPS.


Call for Book Chapter Proposals
Chapter Proposal Submission by September 27, 2015.

Submission Procedure:
Please email your abstract (max. 500 words) by September 27, 2015 to cps.wiley@gmail.com.

Tentative Table of Contents – additions to the topics listed below are much welcome!

 

Part I: Foundations and Principles

Chapter 1. Cybersecurity and Privacy: Past, Present and Future

Chapter 2. The interplay of Cyber, Physical, and Human elements in CPS

Chapter 3. Adaptive attack mitigation for CPS

Chapter 4. Authentication and access control for CPS

Chapter 5. Availability, recovery and auditing for CPS

Chapter 6. Data security and privacy for CPS

Chapter 7. Intrusion detection for CPS

Chapter 8. Key management in CPS

Chapter 9. Legacy CPS system protection

Chapter 10. Lightweight crypto and security

Chapter 11. Threat modeling for CPS

Chapter 12. Vulnerability analysis for CPS

 

Part II: Application Domains 

Chapter 13.            Energy

Chapter 14.            Medical

Chapter 15.            Transportation

Chapter 16.            Physical Infrastructure

Chapter 17.            Manufacturing

Chapter 18.            Building

Chapter 19.            Agriculture

Chapter 20.            Robotics

Chapter 21.            Unmanned Aerial Vehicles

Chapter 22.            Smart Cities


Please provide the following points in your proposals/abstracts:
1. Title of the contribution,
2. Title of the chapter (of the tentative TOC) if the contribution refers to one of them,
3. Name of author, co-authors, institution, email-address,
4. Content/mission of the proposed article.

Authors of accepted proposals will be notified by the given deadline about the status of their proposals and sent chapter guidelines.

Full Book Chapter:
Complete chapters are required to be submitted to cps.wiley@gmail.com. Author could use LaTex or any word processing tools (MS Word, OpenDocument, etc.) while preparing the chapters. A book chapter is required to be 18 to 25 pages (8,000 to 10,000 words).

Please provide the following points in your contribution:
1. Chapter title
2. Author information (of all authors: title, first name, last name, organization, address, city, zip code, country, email address)
3. Abstract
4. 5-10 keywords
5. Text body
6. Bibliography

Important Dates:

·         Chapter Proposal Submission by: September 27, 2015

·         Author Notification by: October 11, 2015

·         Full Chapter Submission by: November 30, 2015

·         Review Results Returned by: December 31, 2015

·         Final Chapter Submission by: February 15, 2016

·         Anticipated Publication Date: Summer, 2016 

Editors:

Houbing Song, West Virginia University, USA. <Houbing.Song@mail.wvu.edu>

Glenn A. Fink, Pacific Northwest National Laboratory, USA. <Glenn.Fink@pnnl.gov>

Gilad L. Rosner, Internet of Things Privacy Forum, UK. <gilad@giladrosner.com>

Sabina Jeschke, RWTH Aachen University, Germany. <sabina.jeschke@ima-zlw-ifu.rwth-aachen.de>

General Announcement
Not in Slideshow
Houbing Song Submitted by Houbing Song on September 11th, 2015
The goal of this research is to develop fundamental theory, efficient algorithms, and realistic experiments for the analysis and design of safety-critical cyber-physical transportation systems with human operators. The research focuses on preventing crashes between automobiles at road intersections, since these account for about 40% of overall vehicle crashes. Specifically, the main objective of this work is to design provably safe driver-assist systems that understand driver?s intentions and provide warnings/overrides to prevent collisions. In order to pursue this goal, hybrid automata models for the driver-vehicles-intersection system, incorporating driver behavior and performance as an integral part, are derived from human-factors experiments. A partial order of these hybrid automata models is constructed, according to confidence levels on the model parameters. The driver-assist design problem is then formulated as a set of partially ordered hybrid differential games with imperfect information, in which games are ordered according to parameter confidence levels. The resulting designs are validated experimentally in a driving simulator and in large-scale computer simulations. This research leverages the potential of embedded control and communication technologies to prevent crashes at traffic intersections, by enabling networks of smart vehicles to cooperate with each other, with the surrounding infrastructure, and with their drivers to make transportation safer, more enjoyable, and more efficient. The work is based on a collaboration among researchers in formal methods, autonomous control, and human factors who are studying realistic and provably correct warning/override algorithms that can be readily transitioned to production vehicles.
Off
Massachusetts Institute of Technology
-
National Science Foundation
Domitilla Del Vecchio
Domitilla Del Vecchio Submitted by Domitilla Del Vecchio on August 27th, 2015
Trustworthy operation of next-generation complex power grid critical infrastructures requires mathematical and practical verification solutions to guarantee the correct infrastructural functionalities. This project develops the foundations of theoretical modeling, synthesis and real-world deployment of a formal and scalable controller code verifier for programmable logic controllers (PLCs) in cyber-physical settings. PLCs are widely used for control automation in industrial control systems. A PLC is typically connected to an engineering workstation where engineers develop the control logic to process the input values from sensors and issue control commands to actuators. The project focuses on protecting infrastructures against malicious control injection attacks on PLCs, such as Stuxnet, that inject malicious code on the device to drive the underlying physical platform to an unsafe state. The broader impact of this proposal is highly significant. It offers potential for real-time security for critical infrastructure systems covering sectors such as energy and manufacturing. The project's intellectual merit is in providing a mathematical and practical verification framework for cyber-physical systems through integration of offline formal methods, online monitoring solutions, and power systems analysis. Offline formal methods do not scale for large-scale platforms due to their exhaustive safety analysis of all possible system states, while online monitoring often reports findings too late for preventative action. This project takes a hybrid approach that dynamically predicts the possible next security incidents and reports to operators before an unsafe state is encountered, allowing time for response. The broader impact of this project is in providing practical mathematical analysis capabilities for general cyber-physical safety-critical infrastructure with potential direct impact on our national security. The research outcomes are integrated into education modules for graduate, undergraduate, and K-12 classrooms.
Off
Rutgers University New Brunswick
-
National Science Foundation
Saman Aliari Zonouz
Saman Zonouz Submitted by Saman Zonouz on August 27th, 2015

The objective of this research is an injection of new modeling techniques into the area of Cyber-Physical Systems (CPSs). The approach is to design new architectures for domain-specific modeling tools in order to permit feedback from analysis, validation, and verification engines to influence how CPSs are designed. This project involves new research into the integration of existing, heterogeneous modeling languages in order to address problems in CPS design, rather than a single language for all CPS. Since many tools for analysis, validation, and verification focus on at most two of the three major components of CPS (communication, computation, and control), new paradigms in modeling are used to integrate tools early in the design process. The algorithms and software developed in this project run validation and verification tools on models, and then close the loop by using the tool outputs to automatically modify the system models. The satisfaction of design requirements in CPSs is critical for tomorrow's societal technologies such as smart buildings, home healthcare, and water management. Among the most compelling design requirements are those of safety, and CPSs for autonomous vehicles exemplify this well. By involving a full-sized autonomous vehicle in this project, the validation and verification of safety requirements is tied to a concrete platform that is broadly understood. By involving students in the design of behaviors of the vehicle, the project exposes scientists and engineers of tomorrow to societal-scale problems, and tools to address them.

Off
-
National Science Foundation
Jonathan Sprinkle (Former PI)
Jonathan Sprinkle
Submitted by Loukas Lazos on August 27th, 2015

CALL FOR WORKSHOP AND TUTORIAL PROPOSALS

Cyber-Physical Systems Week (CPS Week)

April 11-14, 2016 | Vienna, Austria | http://www.cpsweek.org/2016/

CPS Week is the premier event on Cyber-Physical Systems. It brings together four top conferences, HSCC, ICCPS, IPSN, and RTAS, 10-15 workshops, a localization competition, tutorials, and various exhibitions from both industry and academia. Altogether the CPS Week program covers a multitude of complementary aspects of CPS, and reunites the leading researchers in this dynamic field. CPS Week 2016 in Vienna, Austria, will host 10-15 workshops (subject to room availability) and 2-3 tutorials on Monday April 11 and is soliciting proposals for new and recurring workshops as well as for tutorials. CPS Week workshops are excellent opportunities to bring together researchers and practitioners from different  communities to share their experiences in an interactive atmosphere and to foster collaboration for new and innovative projects. We invite you to  submit workshop proposals on any topic related to the broad set of research, education, and application areas in cyber-physical systems.

Guidelines for workshop proposals:

Proposals should be submitted at the latest by *** October 1, 2015 ***

A workshop proposal consists of a 2-page maximum PDF file, including the following information:

  • A concise title of the workshop
  • Description of the topics and specific issues that the workshop will address, how the workshop complements CPS Week conferences and why the workshop theme is relevant
  • Expected format of the workshop (regular paper presentations, poster presentations, invited talks, panel discussions, demo sessions, or other ideas to promote active exchange of ideas)
  • Organizers with short bio, affiliation, and their expertise in the proposed topic(s)
  • In case the workshop has been previously held, provide information to show that the previous edition(s) were successful in terms of paper submissions and/or attendance. Links to past workshop editions would be very helpful too.
  • Length of the workshop (half-day/one-day) and the expected number of participants
  • Follow-up plans (if any) to disseminate the ideas from the workshop, for example through proceedings or journal special issue

Please submit your workshop proposal by email to the workshop and tutorial chairsChristoph Kirsch (ck@cs.uni-salzburg.at) and Ana Sokolova (anas@cs.uni-salzburg.at). Please write “[CPSWeek 2016] Workshop Proposal" in the e-mail subject line.

Guidelines for tutorial proposals:
Proposals should be submitted at the latest by *** October 1, 2015 ***

A proposal consists of a 2-page maximum PDF file, including the following  information on the tutorial program:

  • The title and abstract of the tutorial
  • An outline of tutorial content and objectives
  • Prerequisite knowledge
  • Organizers/Speakers with short bio, affiliation, and their expertise in the proposed topic(s)
  • In case the tutorial has been previously held, include information on the last tutorial of the same topic held within CPS Week or other conferences such as the year it was held and the number of attendees. A link to past tutorial would be very helpful too.
  • We envision tutorials to last for 3 hours.

Please submit your tutorial proposal by email to the workshop and tutorial chairs, Christoph Kirsch (ck@cs.uni-salzburg.at) and Ana Sokolova (anas@cs.uni-salzburg.at). Please write “[CPSWeek 2016] Tutorial Proposal" in the e-mail subject line.
———————————————————————————————————— 
Notification of acceptance  *** October 15, 2015 ***
———————————————————————————————————— 

General Announcement
Not in Slideshow
Submitted by Anonymous on August 25th, 2015
Event
CRTS 2015
8th International Workshop on Compositional Theory and Technology for Real-Time Embedded Systems (CRTS 2015) Collocated with RTSS 2015. San Antonio TX. USA
Submitted by Anonymous on August 25th, 2015
Event
ARD2016
FIRST CALL FOR PAPERS ARC2016: 12th International Symposium on Applied Reconfigurable Computing    21-24 March 2016 | Mangaratiba, Rio de Janeiro, Brazil |   http://lcr.icmc.usp.br/arc2016/
Submitted by Anonymous on August 25th, 2015
Event
ARCS 2016
29th GI/ITG International Conference on *Architecture of Computing Systems* (ARCS 2016) The ARCS series of conferences has a long tradition reporting high quality results in computer architecture and operating systems research. The focus of the 2016 conference will be on *Heterogeneity in Architectures and Systems - From Embedded to HPC*. In 2016, ARCS will be organized by the Department of Computer Science at the Friedrich-Alexander University Erlangen-Nürnberg (FAU).
Submitted by Anonymous on August 25th, 2015

Call For Papers

CPS Security & Privacy 2016 : Call for Book Chapter Proposals for Security and Privacy in Cyber-Physical Systems: Foundations and Applications (Wiley)

Submission Deadline Aug 31, 2015
Notification Due Sep 15, 2015
Final Version Due Nov 30, 2015     
               

Dear Colleague,

We would like to cordially invite you to contribute a book chapter to a forthcoming book entitled "Security and Privacy in Cyber-Physical Systems: Foundations and Applications" which will be published by Wiley.

Call for Chapters

Chapter Proposal Submission by August 31, 2015.

Submission Procedure:

Please email your abstract (max. 500 words) by August 31, 2015 to cps.wiley@gmail.com and indicate the specific chapter where your work best fits or propose your own topic relevant to the theme of the book.

Please provide the following points in your proposals/abstracts:

1. Title of the contribution,
2. Title of the chapter (of the tentative TOC) if the contribution refers to one of them,
3. Name of author, co-authors, institution, email-address,
4. Content/mission of the proposed article.

Authors of accepted proposals will be notified by the given deadline about the status of their proposals and sent chapter guidelines.

The topics of interest include but are not limited to:

Part I: Foundations and Principles

Chapter 1. Cybersecurity and Privacy: Past, Present and Future
Chapter 2. The interplay of Cyber, Physical, and Human elements in CPS
Chapter 3. Adaptive attack mitigation for CPS
Chapter 4. Authentication and access control for CPS
Chapter 5. Availability, recovery and auditing for CPS
Chapter 6. Data security and privacy for CPS
Chapter 7. Intrusion detection for CPS
Chapter 8. Key management in CPS
Chapter 9. Legacy CPS system protection
Chapter 10. Lightweight crypto and security
Chapter 11. Threat modeling for CPS
Chapter 12. Vulnerability analysis for CPS

Part II: Application Domains

Chapter 13. Energy
Chapter 14. Medical
Chapter 15. Transportation
Chapter 16. Physical Infrastructure
Chapter 17. Manufacturing
Chapter 18. Building
Chapter 19. Agriculture
Chapter 20. Robotics
Chapter 21. Unmanned Aerial Vehicles
Chapter 22. Smart Cities

Editors:

  • Houbing Song, West Virginia University, USA (Houbing.Song@mail.wvu.edu)
  • Glenn A. Fink, Pacific Northwest National Laboratory, USA (Glenn.Fink@pnnl.gov)
  • Sabina Jeschke, RWTH Aachen University, Germany (sabina.jeschke@ima-zlw-ifu.rwth-aachen.de)
  • Gilad L. Rosner, Internet of Things Privacy Forum, UK (gilad@giladrosner.com) 
General Announcement
Not in Slideshow
Submitted by Anonymous on August 2nd, 2015
Subscribe to Critical Infrastructure