Team for Research in
Ubiquitous Secure Technology

SCS Header
Workshop Overview
Important Dates
Workshop Goals
More Information
Back to TRUST Conferences
Workshop Goals Over the last few years, researchers have gathered at CPSWeek to define the research scope for cyber-physical systems (CPS) which are systems that integrate computation, networking, and physical processes. Modern control technology is based on embedded computers and networked systems that monitor and control large-scale physical processes. The use of internet-connected devices and commodity IT solutions to enhance scalability and performance of control systems on one hand and the malicious intents of hackers and cybercrime networks on the other have made control systems more vulnerable now than before.

Despite numerous attempts to develop guidelines for the design and operation of security policies for control systems, much remains to be done in order to arrive at a principled approach to enhance security, trustworthiness, and dependability of control systems. In light of the nascent state of this discipline, the scope of this workshop is to discuss theories and methodologies that encompass ideas from:

  • Robust, fault-tolerant and networked control systems
  • Heterogeneous composition, abstraction and verification methods
  • Information security and privacy.
  • Included, to both enliven and broaden the discussion across disciplines during the workshop, will be a tutorial which discusses the current state of software security, the human importance and weakness in aiding system security and robustness, and an example demonstrating the difficulty of assessing potential damage to systems under cyber attack. As the practicality and benefit of new technologies require both simulated and experimental environments to handle interdependencies, an overview of the process and opportunities for verification will be suggested. The tutorial will emphasize that both resilience and security need to be integrated to achieve the desired protection of our critical physical processes.

    In doing so, the workshop aims to foster collaborations between interested researchers from the fields of control and systems theory, software verification and computer security. A secondary goal of the workshop is to discuss the establishment of dedicated benchmarks and test-beds that can help in accelerating the development of new theories and tools.

    The scope of the workshop includes, but is not restricted to, the following topics:

  • Taxonomy of attacks and attack models for control systems
  • Novel security challenges in control systems
  • Testbeds for security of critical infrastructure systems
  • Decision and game theoretic approaches to security analysis
  • Design architectures for prevention and resilience against attacks
  • Risk assessment and verification of security properties
  • Detectability and diagnosis of attacks
  • Resilience and robustness against attacks
  • Response and reconfiguration methods
  • Cyber awareness of human-centric systems
  • Complexity and resilience in control systems
  • Approaches that can be applied to particular critical infrastructure systems such as power grid, water distribution, transportation systems and process control systems are particularly welcomed.


    footer logos