SafeThings 2023

IEEE/ACM Workshop on the Internet of Safe Things

Co-located with CPS-IoT Week 2023 »

San Antonio, Texas USA, May 9, 2023

The Internet of Things has become increasingly popular and innovative. With the rise of connected devices, we have an opportunity to significantly improve the safety of legacy systems. For instance, insights from data across systems can be exploited to reduce accidents, improve air quality and support disaster events. IoT-based cyber-physical systems (CPS) also bring new risks that arise due to the unexpected interaction between systems and the larger number of attack vectors on these systems. These safety risks can arise in the context of use of medical devices, smart home appliance control, autonomous vehicle and intelligent transportation designs, or conflicts in policy execution at a societal scale.

The Workshop on the Internet of Safe Things seeks to bring together researchers to create solutions for the development of safe cyber-physical systems. As safety is inherently linked with the security and privacy of a system, we also seek contributions in these areas that address safety concerns. We seek to develop a community that systematically dissects the vulnerabilities and risks exposed by these emerging CPSs, and creates tools, algorithms, frameworks, and systems that help in the development of safe systems.

We seek contributions across domains - autonomous vehicles, smart homes, medical devices, smart grid, intelligent transportation; and across disciplines - systems, control, human-computer interaction, privacy, security, reliability, machine learning, and verification.

Important Dates


Paper Submission Deadline February 13th February 17th, 2023 (AoE, UTC-12)
Acceptance Notification March 1st March 5th, 2023
Camera-ready Submission Deadline March 12th March 13th, 2023 (AoE, UTC-12)
Workshop May 9th, 2023

Call for Papers

As the traditionally segregated systems are brought online for next-generation connected applications, we have an opportunity to significantly improve the safety of legacy systems. For instance, insights from data across systems can be exploited to reduce accidents, improve air quality and support disaster events. Cyber-physical systems (CPS) also bring new risks that arise due to the unexpected interaction between systems and the environment. These safety risks arise because of information that distracts users while driving, software errors in medical devices, corner cases in data-driven control, compromised sensors in drones or conflicts in societal policies. Accordingly, the Workshop on the Internet of Safe Things (or SafeThings, for brevity) seeks to bring researchers and practitioners that are actively exploring system design, modeling, verification, authentication approaches to provide safety guarantees in the Internet of Things (IoT). The workshop welcomes contributions that integrate hardware and software systems provided by disparate vendors, particularly those that have humans in the loop. As safety is inherently linked with security and privacy, we also seek contributions in these areas that address safety concerns. With the SafeThings workshop, we seek to develop a community that systematically dissects the vulnerabilities and risks exposed by these emerging CPSes, and create tools, algorithms, frameworks, and systems that help in the development of safe systems.

The scope of SafeThings includes safety topics as it relates to an individual's health (physical, mental), society (air pollution, toxicity, disaster events), or the environment (species preservation, global warming, oil spills). The workshop considers safety from a human perspective, and thus, does not include topics such as thread safety or memory safety in its scope.

Topics of interest include, but are not limited to, the following categories:

In addition, application domains of interest include, but are not limited to autonomous vehicles and transportation infrastructure; medical CPS and public health; smart buildings, smart grid and smart cities.

The PC will select a best paper award for work that distinguishes itself in moving the security and privacy of IoT/CPS forward through novel attacks or defenses.

Call for Demos

In addition to presentation of accepted papers, SafeThings will include a demo session that is designed to allow researchers to share demonstrations of their systems that include CPS/IoT security and safety as a major design goal. Demos of attacks are also welcome.


Submission Instructions

Submitted papers must be in English, unpublished, and must not be currently under review for any other publication. Manuscripts should be no more than 6 pages, including all figures, tables, and references in ACM two-column conference proceedings style (https://www.acm.org/publications/proceedings-template/), using US Letter (8.5-inch x 11-inch) paper size. Demos must be at most 1 single-spaced, double column 8.5” x 11” page, and have "Demo:" in their titles. All figures must fit within these limits. Papers that do not meet the size and formatting requirements will not be reviewed. All papers must be in Adobe Portable Document Format (PDF) and submitted through the web submission form via the submission link below. The review process is double-blind.

Full Papers: 6 pages including all figures, tables, and references.
Demos: 1 page (with "Demo:" in the title).

Submission Page »


ACM's Publications Policies

By submitting your article to an ACM Publication, you are hereby acknowledging that you and your co-authors are subject to all ACM Publications Policies, including ACM's new Publications Policy on Research Involving Human Participants and Subjects. Alleged violations of this policy or any ACM Publications Policy will be investigated by ACM and may result in a full retraction of your paper, in addition to other potential penalties, as per ACM Publications Policy.

Please ensure that you and your co-authors obtain an ORCID ID, so you can complete the publishing process for your accepted paper. ACM has been involved in ORCID from the start and we have recently made a commitment to collect ORCID IDs from all of our published authors. The collection process has started and will roll out as a requirement throughout 2022. We are committed to improve author discoverability, ensure proper attribution and contribute to ongoing community efforts around name normalization; your ORCID ID will help in these efforts.


Presentations: 12-15 mins + 3-5 mins Q&A

All times are in CST (UTC-6) (The program is tentative and slight changes may happen)

09:00 AM- 09:15 AM Opening remarks Program Committee
09:15 AM- 10:15 AM Keynote Talk by Dr. Georgios Fainekos Session Chair: Z. Berkay Celik
10:15 AM- 10:30 AM Break
10:30 AM- 11:30 AM SESSION 1: Critical Infrastructure Security Session Chair: Hoda Mehrpouyan
Cooperative Verification of PLC Programs Using CoVeriTeam: Towards a reliable and secure Industrial Control Systems Chibuzo Ukegbu (Boise State University), Hoda Mehrpouyan (Boise State University)
Adversarial-HD: Hyperdimensional Computing Adversarial Attack Design for Secure Industrial Internet of Things Onat Gungor (UC San Diego), Tajana Rosing (UC San Diego), Baris Aksanli (San Diego State University)
Insecure by Design in the Backbone of Critical Infrastructure Jos Wetzels and Daniel dos Santos (Forescout); Mohammad Ghafari (TU Clausthal)
11:30 PM- 01:00 PM Lunch Break
01:00 PM- 02:00 PM SESSION 2: Vehicle Security and Privacy Session Chair: Robert Kaster
Digital Shadows for Automotive Remote Attestation Robert Kaster (University of Michigan-Dearborn, Robert Bosch), Di Ma (University of Michigan-Dearborn)
An Adversarial Attack on DNN-based Adaptive Cruise Control Systems Yanan Guo (University of Pittsburgh), Christopher DiPalma (UC Irvine), Takami Sato (UC Irvine), Yulong Cao (University of Michigan), Alfred Chen (UC Irvine), Yueqiang Cheng (NIO)
Towards Efficient Personalized Driver Behavior Modeling with Machine Unlearning Qun Song (Delft University of Technology), Rui Tan (Nanyang Technological University), Jianping Wang (City University of Hong Kong)
02:00 PM- 02:15 PM Break
02:15 PM- 03:30 PM SESSION 3: IoT Security and Privacy Session Chair: Ning Zhang
Protocol-agnostic IoT Device Classification on Encrypted Traffic Using Link-Level Flows Gabriel Morales (The University of Texas at San Antonio), Adam Bienek-Parrish (The University of Texas at San Antonio), Patrick Jenkins (The University of Texas at San Antonio), Rocky Slavin (University of Texas at San Antonio)
MVAM: Multi-variant Attacks on Memory for IoT Trust Computing Arup Kumar Sarker (University of Virginia), Md. Khairul Islam (University of Virginia), Yuan Tian (University of California Los Angeles), Geoffrey Fox (University of Virginia)
HACKWRT: Network Traffic-Based Eavesdropping of Handwriting Aaron Kinfe (University of Virginia), Chijung Jung (University of Virginia), Kai Lin (University of Virginia), Marshall Clyburn (University of Virginia), Fnu Suya (University of Virginia)
Towards Usable Parental Control for Voice Assistants Peiyi Yang (University of Virginia), Jie Fan (University of Virginia), Zice Wei (University of Virginia), Haoqian Li (University of Virginia), Tu Le (University of Virginia), Yuan Tian (University of California Los Angeles)
03:30 PM- 04:00 PM Closing remarks and Awards Program Committee

Keynote

In search of Automated Driving Systems Safety through Formal Requirements


Tuesday, May 9, 2023
09:15 AM - 10:15 AM

As the hype around the imminent mass deployment of fully Automated Driving Systems (ADS) on public roads recedes, industry and government agencies are facing the challenge of how to assess and certify safety of ADS. The problem is challenging primarily due to the unpredictable nature of driving on open public roads. If anything can happen at any time, then what are you supposed to test and assure against? We argue that testing ADS must be driven by assume-guarantee requirements. Requirements must capture not only the minimum desired performance of system components as part of the ADS performance, but also the rules of the road. In this presentation, we provide an overview of how such requirements can be formalized in temporal logics. Then, we demonstrate how these requirements can be used for monitoring as well as for search-based testing in ADS. In addition, we introduce a new temporal logic specifically designed for perception systems. Our ADS requirements driven test generation framework Sim-ATAV based on S-TaLiRo and Webots is open source and publicly available. Finally, we briefly highlight how the same framework can be helpful in identifying security vulnerabilities in CPS.

Keynote Speaker: Dr. Georgios Fainekos


...

Georgios Fainekos (aka Dr. ΓΦ) is a Senior Principal Scientist at Toyota Motor North America R&D (within TRINA a division of AMRD). He received his Ph.D. in Computer and Information Science from the University of Pennsylvania in 2008 where he was affiliated with the GRASP laboratory. He holds a Diploma degree (B.Sc. & M.Sc.) in Mechanical Engineering from the National Technical University of Athens. Among other professional roles, he has been a tenured faculty of Computer Science and Computer Engineering at Arizona State University, and a Postdoctoral Researcher at NEC Laboratories America in the System Analysis & Verification Group. He is currently working on Cyber-Physical Systems (CPS) and robotics with a focus on Automated Driving Systems (ADS). His technical expertise is on applied logic, formal verification & requirements, testing, control theory, artificial intelligence, and optimization. In 2013, Dr. Fainekos received the NSF CAREER award and the ASU SCIDSE Best Researcher Junior Faculty Award. He has also been recognized with the top 5% teacher award in 2019 and 2021. His research has received several awards and nominations (e.g., IEEE CASE 2021, IEEE ITSC 2019, ACM HSCC 2019, IEEE/ACM MEMOCODE 2019), and the 2008 Frank Anger Memorial ACM SIGBED/SIGSOFT Student Award. In 2016, Dr. Fainekos was the program co-Chair for the ACM International Conference on Hybrid Systems: Computation and Control (HSCC).


Organization


General Chairs

Yuan Tian (University of Califonia, Los Angeles, USA)

Dave (Jing) Tian (Purdue University, USA)


Program Committee Chairs

Saman Zonouz (Georgia Institute of Technology, USA)

Z. Berkay Celik (Purdue University, USA)


Web Chair

Faysal Hossain Shezan (University of Virginia, USA)


Publicity Chair

Habiba Farrukh (Purdue University, USA)


Technical Program Committee

Pelin Angin (Middle East Technical University, Turkey)

Musard Balliu (KTH Royal Institute of Technology, Sweden)

Alvaro Cardenas (University of California, Santa Cruz, USA)

Qi Alfred Chen (University of California, Irvine, USA)

Pubali Datta (University of Illinois at Urbana-Champaign, USA)

Mohammad Al Faruque (University of California Irvine, USA)

Ryan Gerdes (Virginia Tech, USA)

Maria Gorlatova (Duke University, USA)

Jun Han (Yonsei University, South Korea)

Hongxin Hu (University at Buffalo SUNY, USA)

Kyungtae Kim (Purdue University, USA)

Jiwon Kim (Purdue University, USA)

Ming Li (University of Arizona, USA)

Jingjie Li (University of Wisconsin-Madison, USA)

Muslum Ozgur Ozmen (Purdue University, USA)

Amir Rahmati (Stony Brook University, USA)

Neetesh Saxena (Cardiff University, UK)

Yasser Shoukry (University of California Irvine, USA)

Nils Ole Tippenhauer (CISPA, Germany)

Guliz Seray Tuncay (Google, USA)

Qiben Yan (Michigan State University, USA)

James Weimer (Vanderbilt University, USA)

Gang Wang (University of Illinois at Urbana-Champaign, USA)

Ziming Zhao (University at Buffalo, USA)