SafeThings 2022
IEEE Workshop on the Internet of Safe Things
Co-located with Oakland 2022 »
May 26th, 2022
The Internet of Things has become increasingly popular and innovative. With the rise of connected devices, we have an opportunity to significantly improve the safety of legacy systems. For instance, insights from data across systems can be exploited to reduce accidents, improve air quality and support disaster events. IoT-based cyber-physical systems (CPS) also bring new risks that arise due to the unexpected interaction between systems and the larger number of attack vectors on these systems. These safety risks can arise in the context of use of medical devices, smart home appliance control, autonomous vehicle and intelligent transportation designs, or conflicts in policy execution at a societal scale.
The Workshop on the Internet of Safe Things seeks to bring together researchers to create solutions for the development of safe cyber-physical systems. As safety is inherently linked with the security and privacy of a system, we also seek contributions in these areas that address safety concerns. We seek to develop a community that systematically dissects the vulnerabilities and risks exposed by these emerging CPSs, and creates tools, algorithms, frameworks, and systems that help in the development of safe systems.
We seek contributions across domains - autonomous vehicles, smart homes, medical devices, smart grid, intelligent transportation; and across disciplines - systems, control, human-computer interaction, privacy, security, reliability, machine learning, and verification.
Important Dates
Paper Submission Deadline | |
Acceptance Notification | |
Camera-ready Submission Deadline | |
Workshop | May 26th, 2022 |
Program anchor
Program
09:00 AM - 09:15 AM | Opening remarks
09:15 AM - 10:15 AM | Keynote Talk
Prof. Patrick McDaniel
10:15 AM - 10:30 AM | Break
10:30 AM - 11:50 PM | SESSION 1: IoT sec with human factors/flavors (20 min each: 15 min presentation + 5 min Q&A)
Chair: Luyi Xing
Jimmy Briggs, Unaffiliated; Christine Geeng, University of Washington
Biometric Identification System based on Object Interactions in Internet of Things Environments
Klaudia Krawiecka, Simon Birnbach, Simon Eberz and Ivan Martinovic, University of Oxford
Capabilities-based access control for IoT devices using Verifiable Credentials
Nikos Fotiou, Vasilios A. Siris and George C. Polyzos, Athens University of Economics and Business; Yki Kortesniemi and Dmitrij Lagutin, Aalto University;
Face Recognition Systems: Are you sure they only consider your face?
Pavan Srihari Darbha, BITS Pilani; Mauro Conti and Eleonora Losiouk, University of Padua; Rajib Ranjan Maiti, BITS Pilani
11:50 PM - 01:00 PM | Lunch Break
01:00 PM - 02:20 PM | SESSION 2: CPS/ICS/IoT (20 min each: 15 min presentation + 5 min Q&A)
Chair: Eleonora Losiouk
Zhongyuan Hau, Soteris Demetriou and Emil C. Lupu, Imperial College London
AutoCPS: Control Software Dataset Generation for Semantic Reverse Engineering
Haoda Wang, Christophe Hauser and Luis Garcia, University of Southern California
You Can’t Protect What You Don’t Understand: Characterizing an Operational Gas SCADA Network
Xi Qin, University of California, Santa Cruz; Martin Rosso, Eindhoven University of Technology; Alvaro A. Cardenas, University of California, Santa Cruz; Sandro Etalle, Jerry den Hartog, and Emmanuele Zambon, Eindhoven University of Technology;
Towards Wireless Spiking of Smart Locks
Abdullah Z Mohammed and Alok Singh, Virginia Tech; Gökçen Y Dayanıklı, Iowa State University; Ryan Gerdes, Virginia Tech; Mani Mina, Iowa State University; Ming Li, University of Arizona
02:20 PM - 02:30 PM | Awards
02:30 PM - 02:45 PM | Closing remarks
1. All times are in PDT (UTC-8)
2. The online platform: https://app.hopin.com/events/43rd-ieee-symposium-on-security-and-privacy
3. You will need to be registered for the workshops to access the online platform
Keynote anchor
Keynote
Prognosticating the Future of IoT Security
Thursday, May 26, 2022
9:15am - 10:15am
IoT has rapidly changed the nature of users' interactions with, among other things, physical spaces, transportation, and medicine. At the same time, IoT is altering industrial sectors such farming, manufacturing, and energy. However, the introduction of these powerful new technologies have introduced new classes of safety, security and privacy concerns. It has been observed that concerns are the result of technical or procedural failures in the deployment of IoT or limitations in IoT infrastructure, applications, and markets. In this talk, I briefly discuss work over the past half decade of IoT security and try to identify major trends and solutions that define the state of the field. From this, I will begin to explore questions that will define the second epoch of IoT security and posit important problems and challenges that will make future environments safe, secure, and private.
Keynote Speaker: Patrick McDaniel, Pennsylvania State University
Dr. Patrick McDaniel is the William L. Weiss Professor of Information and Communications Technology in the School of Electrical Engineering and Computer Science at Pennsylvania State University and a fellow of IEEE, ACM, and the AAAS. He is also the Director of the Institute for Networking and Security Research (INSR), a research institute focused on the study of networking and security in computing environments. Further, he is the director of The Center for Trustworthy Machine Learning (CTML), which is a Frontier project in Secure & Trustworthy Computing supported by the National Science Foundation. The focus of the Center is to develop a rigorous understanding of the vulnerabilities inherent to machine learning, and to develop the tools, metrics, and methods to mitigate them.
His professional life is devoted to the pursuit of novel research in a broad array of areas of computer science. His research focuses on a wide range of topics in computer and network security and technical public policy, with particular interests in mobile device security, adversarial machine learning, systems security, program analysis, and the integrity and security of election systems.
Accepted papers
Accepted Papers
BLE-Doubt: Smartphone-Based Detection of Malicious Bluetooth Trackers
Jimmy Briggs, Unaffiliated; Christine Geeng, University of Washington
Biometric Identification System based on Object Interactions in Internet of Things Environments
Klaudia Krawiecka, Simon Birnbach, Simon Eberz and Ivan Martinovic, University of Oxford
Capabilities-based access control for IoT devices using Verifiable Credentials
Nikos Fotiou, Vasilios A. Siris and George C. Polyzos, Athens University of Economics and Business; Yki Kortesniemi and Dmitrij Lagutin, Aalto University;
Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception
Zhongyuan Hau, Soteris Demetriou and Emil C. Lupu, Imperial College London
AutoCPS: Control Software Dataset Generation for Semantic Reverse Engineering
Haoda Wang, Christophe Hauser and Luis Garcia, University of Southern California
You Can't Protect What You Don't Understand: Characterizing an Operational Gas SCADA Network
Xi Qin, University of California, Santa Cruz; Martin Rosso, Eindhoven University of Technology; Alvaro A. Cardenas, University of California, Santa Cruz; Sandro Etalle, Jerry den Hartog, and Emmanuele Zambon, Eindhoven University of Technology;
Towards Wireless Spiking of Smart Locks
Abdullah Z Mohammed and Alok Singh, Virginia Tech; Gökçen Y Dayanıklı, Iowa State University; Ryan Gerdes, Virginia Tech; Mani Mina, Iowa State University; Ming Li, University of Arizona
Face Recognition Systems: Are you sure they only consider your face?
Pavan Srihari Darbha, BITS Pilani; Mauro Conti and Eleonora Losiouk, University of Padua; Rajib Ranjan Maiti, BITS Pilani
cfp anchor
Call for Papers
As the traditionally segregated systems are brought online for next-generation connected applications, we have an opportunity to significantly improve the safety of legacy systems. For instance, insights from data across systems can be exploited to reduce accidents, improve air quality and support disaster events. Cyber-physical systems (CPS) also bring new risks that arise due to the unexpected interaction between systems and the environment. These safety risks arise because of information that distracts users while driving, software errors in medical devices, corner cases in data-driven control, compromised sensors in drones or conflicts in societal policies. Accordingly, the Workshop on the Internet of Safe Things (or SafeThings, for brevity) seeks to bring researchers and practitioners that are actively exploring system design, modeling, verification, authentication approaches to provide safety guarantees in the Internet of Things (IoT). The workshop welcomes contributions that integrate hardware and software systems provided by disparate vendors, particularly those that have humans in the loop. As safety is inherently linked with security and privacy, we also seek contributions in these areas that address safety concerns. With the SafeThings workshop, we seek to develop a community that systematically dissects the vulnerabilities and risks exposed by these emerging CPSes, and create tools, algorithms, frameworks, and systems that help in the development of safe systems.
The scope of SafeThings includes safety topics as it relates to an individual's health (physical, mental), society (air pollution, toxicity, disaster events), or the environment (species preservation, global warming, oil spills). The workshop considers safety from a human perspective, and thus, does not include topics such as thread safety or memory safety in its scope.
Topics of interest include, but are not limited to, the following categories:
- Verification of safety in IoT/CPS platforms
- Authentication in IoT/CPS settings
- Adversarial machine learning and testing of IoT/CPS systems
- Secure perception, localization, and planning in autonomous systems (e.g., autonomous vehicles and drones)
- Sensors/analog and network protocol security in IoT/CPS systems
- Compliance with legal, health, and environmental policies
- Conflict resolution between IoT applications
- Secure connectivity and updates in IoT/CPS
- Secure integration of hardware and software systems
- Privacy challenges in IoT/CPS settings
- Privacy preserving data sharing and analysis
- Resiliency against attacks and faults
- Safety in human-in-the-loop systems
- Support for IoT/CPS development - debugging tools, emulators, testbeds
- Usable security and privacy for IoT/CPS platforms
- Smart homes, smart buildings and smart city security and privacy issues
In addition, application domains of interest include, but are not limited to autonomous vehicles and transportation infrastructure; medical CPS and public health; smart buildings, smart grid and smart cities.
The PC will select a best paper award for work that distinguishes itself in moving the security and privacy of IoT/CPS forward through novel attacks or defenses.
Call for Demos
In addition to presentation of accepted papers, SafeThings will include a demo session that is designed to allow researchers to share demonstrations of their systems that include CPS/IoT security and safety as a major design goal. Demos of attacks are also welcome.
Submission Instructions
Submitted papers must be in English, unpublished, and must not be currently under review for any other publication. Submissions must follow the official IEEE Conference Proceedings format. Full papers must be at most 6 single-spaced, double column 8.5” x 11” pages excluding references. Demos must be at most 1 single-spaced, double column 8.5” x 11” page, and have "Demo:" in their titles. All figures must fit within these limits. Authors are encouraged to use the IEEE conference proceedings templates. LaTeX submissions should use IEEEtran.cls version 1.8b. Papers that do not meet the size and formatting requirements will not be reviewed. All papers must be in Adobe Portable Document Format (PDF) and submitted through the web submission form via HotCRP (submission link below). The review process is double-blind.
Full Papers: 6 pages excluding references.
Demos: 1 page (with "Demo:" in the title).
Submission Form »
Organization anchor
Organization
General Chairs
Danny Yuxing Huang (New York University, USA)
Soteris Demetriou (Imperial College London, UK)
Program Committee Chairs
Sandeep K. Shukla (Indian Institute of Technology Kanpur, India)
Dave (Jing) Tian (Purdue University, USA)
Web Chair
Luyi Xing (Indiana University Bloomington, USA)
Technical Program Committee
Fatima Anwar (University of Massachusetts, Amherst, USA)
Antonio Bianchi (Purdue University, USA)
Berkay Celik (Purdue University, USA)
Rahul Chatterjee (University of Wisconsin - Madison, USA)
Kai Chen (Chinese Academy of Science, China)
Qi Alfred Chen (University of California, Irvine, USA)
Pardis Emami-Naeini (University of Washington, USA)
Maria Gorlatova (Duke University, USA)
Hamed Haddadi (Imperial College London, UK)
Xiali (Sharon) Hei (University of Louisiana, Lafayette, USA)
Grant Hernandez (Qualcomm, USA)
Erisa Karafili (University of Southampton, UK)
Chung Hwan Kim (University of Texas at Dallas, USA)
Kyungtae Kim (Purdue University, USA)
Taegyu Kim (Purdue University and Pennsylvania State University, USA)
Vireshwar Kumar (Indian Institute of Technology (IIT) Delhi, India)
Zhiqiang Lin (Ohio State University, USA)
Eleonora Losiouk (University of Padova, Italy)
Aravind Machiry (Purdue University, USA)
Carsten Maple (University of Warwick, UK)
Patrick McDaniel (Pennsylvania State University, USA)
Hui Peng (Baidu Security, USA)
Atul Prakash (University of Michigan, USA)
Amir Rahmati (Stony Brook University, USA)
Aanjhan Ranganathan (Northeastern University, USA)
Kasper Rasmussen (University of Oxford, UK)
Weisong Shi (Wayne State University, USA)
Yixin Sun (University of Virginia, USA)
Nils Ole Tippenhauer (CISPA Helmholtz Center for Information Security, Germany)
Santiago Torres-Arias (Purdue University, USA)
Güliz Seray Tuncay (Google, USA)
Ben Ujcich (Georgetown University, USA)
André Weimerskirch (Lear, USA)
Luyi Xing (Indiana University, Bloomington, USA)
Ziming Zhao (University at Buffalo, USA)
Saman Zonouz (Rutgers University, USA)
We are keep adding new TPC members. If you would like to be considered for the TPC please contact any of the organisers.