A body of knowledge containing laws, axioms and provable theories relating to some aspect of system security.
The  workshop organized by NIST ITL Computer Security Division will focus on  the cyber security needed for cyber-physical systems (CPSs), with special attention to research results an
Janos Sztipanovits Submitted by Janos Sztipanovits on April 16th, 2012
IEEE DEST 2012 (June 18-20 2012, Campione, ITALY) has a track on Cyber Physical Energy Systems:
Submitted by Peter Palensky on April 16th, 2012
The goal of this two-day, single-track event is to expose researchers to control and modeling challenges in cyber-physical systems (CPS) with the aim of exchanging knowledge and fostering collaborations between academia, industry, and government agencies. The proposed symposium will cover several applications of cyber-physical systems such as networked systems of unmanned vehicles, power grids, green buildings, transportation systems and health-care systems via invited talks, poster presentations and a panel discussion.
Submitted by Quanyan Zhu on April 16th, 2012
SSCPS 2011 The First International Workshop on Safety and Security in Cyber-Physical Systems http://www.sscps.net Jeju Island, Korea, June 27, 2011
Submitted by Wei Dong on April 16th, 2012
Event
SPCC'11
ICCCN 2011 – Track on Security, Privacy, and Cyber-physical Computing (SPCC)  This track aims to bring together researchers and practitioners in the fields of security, privacy, and cyber-physical systems. The track seeks novel contributions on algorithm and system design, implementation, and evaluations.This track aims to bring together researchers and practitioners in the fields of security, privacy, and cyber-physical systems. The track seeks novel contributions on algorithm and system design, implementation, and evaluations.
Chris vanBuskirk Submitted by Chris vanBuskirk on April 16th, 2012
Event
WESS'2010
Embedded computing systems are continuously adopted in a wide range of application areas and importantly, they are responsible for a large number of safety-critical systems as well as for the management of critical information. The advent of Internet-enabled embedded systems introduces a large number of security issues: the Internet can be used to attack embedded systems and embedded systems can be used to attack the Internet. Furthermore, embedded systems are vulnerable to many attacks not relevant to servers because they are physically accessible.
Chris vanBuskirk Submitted by Chris vanBuskirk on April 16th, 2012
NSF Industry Round-Table on Cyber-Physical Systems, May 17, 2007, Arlington, VA.
Submitted by Anonymous on April 16th, 2012
Workshop on Security and Privacy in Cyber-Physical Systems, Sponsored by the Army Research Office, June 26-27, 2008, University of California at Irvine, Irvine, California.
Submitted by Anonymous on April 16th, 2012
The objective of this research is to develop energy-efficient integrity establishment techniques for dynamic networks of cyber physical devices. In such dynamic networks, devices connect opportunistically and perform general-purpose computations on behalf of other devices. However, some devices may be malicious in intent and affect the integrity of computation. The approach is to develop new trust establishment mechanisms for dynamic networks. Existing trusted computing mechanisms are not directly applicable to cyber physical devices because they are resource-intensive and require devices to have special-purpose hardware. This project is addressing these problems along three research prongs. The first is a comprehensive study of the resource bottlenecks in current trust establishment protocols. Second, the insights from this study are being used to develop resource-aware attestation protocols for cyber physical devices that are equipped with trusted hardware. Third, the project is developing new trust establishment protocols for cyber physical devices that may lack trusted hardware. A key outcome of the project is an improved understanding of the tradeoffs needed to balance the concerns of security and resource-awareness in dynamic networks. Dynamic networks allow cyber physical devices to form a highly-distributed, cloud-like infrastructure for computations involving the physical world. The trust-establishment mechanisms developed in this project encourage devices to participate in dynamic networks, thereby unleashing the full potential of dynamic networks. This project includes development of dynamic networking applications, such as distributed gaming and social networking, in undergraduate curricula and course projects, thereby fostering the participation of this key demographic.
Off
Rutgers University New Brunswick
-
National Science Foundation
Ulrich Kremer
Ganapathy, Vinod
Submitted by Vinod Ganapathy on April 7th, 2011
Submitted by Anonymous on May 24th, 2010
Subscribe to Science of Security