Team for Research in
Ubiquitous Secure Technology

SCS Header
Workshop Overview
Important Dates
Workshop Goals
More Information
Back to TRUST Conferences
Workshop Goals

Over the last few years, researchers have gathered at CPSWeek to define the research scope for cyber-physical systems (CPS). These systems govern the operation of critical infrastructures such as power transmission, water distribution, transportation, healthcare, building automation, and process control. At the core of these systems are the modern control technologies that are based on embedded computers and networked systems used to monitor and control large-scale physical processes. The use of internet-connected devices and commodity IT solutions and the malicious intents of hackers and cybercriminals have made these control technologies more vulnerable. Despite attempts to develop guidelines for the design and operation of control systems security policies, much remains to be done to achieve a principled, science-based approach to enhance security, trustworthiness, and dependability of control systems.

The main aim of this workshop is to bring together novel concepts and theories that can help in the development of the science of dependable and secure cyber-physical systems.

This workshop aims to foster collaborations between researchers from the fields of control and systems theory, embedded systems, game theory, software verification and formal methods, and computer security. The scope of this workshop is to discuss theories and methodologies that encompass ideas from:

  • Fault-tolerant and networked control systems
  • Game theory for multi-agent dynamics in uncertain environments, and
  • Learning and verification theory for secure and trustworthy systems.
  • Topics of interest will include, but is not restricted to, the following:
  • Taxonomy of attacks and attack models for control systems
  • Novel security challenges in control systems
  • Testbeds for security of critical infrastructure systems
  • Decision and game theoretic approaches to security analysis
  • Design architectures for prevention and resilience against attacks
  • Risk assessment and verification of security properties
  • Detectability and diagnosis of attacks
  • Economics based studies of security and reliability
  • Resilience and robustness against attacks
  • Response and reconfiguration methods
  • Cyber awareness of human-centric systems
  • Complexity and resilience in control systems
  • Approaches that can be applied to particular critical infrastructure systems in Transportation (surface and aviation), Energy (smart grid and building energy management), and Healthcare (medical systems and associated embedded devices) are particularly welcomed. Also welcomed is foundational work that cuts across multiple application areas or advances the scientific understanding of underlying principles for the development of secure and trustworthy systems, including ways to measure the security properties of a system and methods to conduct robust and repeatable experimentation.


    footer logos