We are excited to announce the 1st Cyber Security in Cars Workshop (CSCS), a workshop focused on addressing the complex challenges of cyber security in modern vehicles. This workshop aims to bring together researchers, practitioners, developers, and anyone interested in solving the myriad cyber security problems in the automotive domain. It offers a platform to discuss the latest developments, share current research contributions, and foster networking and collaboration to develop innovative solutions.
The Cyber Security in Cars Workshop (CSCS) is the successor of the ACM Computer Science in Cars Symposium, building upon the foundation laid by its predecessor and further advancing the field of automotive cybersecurity.
Workshop Program
09:00 - 9:20 |
Opening & Welcome
Hans-Joachim Hof (Program Chair)
|
09:20 - 10:30 |
Session 1: Threat and Security Engineering
Session Chair: Timm LauserRevisiting automotive threat analysis by leveraging the elements of the Threat Landscape
Alexander Åström (Comentor AB)* Classification, Impact, and Mitigation Strategies of Attacks in Automotive Trust Management Systems
Marco Michl (Technische Hochschule Ingolstadt)*; Hans-Joachim Hof (Technical University of Ingolstadt); Stefan Katzenbeisser (University of Passau) Achieving the Safety and Security of the End-to-End AV Pipeline
Noah T Curran (University of Michigan)*; Minkyoung Cho (University of Michigan); Ryan T Feng (University of Michigan); Liangkai Liu (University of Michigan); Brian Tang (University of Michigan); Kang G. Shin (The University of Michigan ); Pedram MohajerAnsari (Clemson University); Alkim Domeke (Clemson University); Mert D Pesé (Clemson University)
|
10:30 - 11:00 |
Coffee Break
|
11:00 - 12:00 |
Keynote: The Future of Automotive Cybersecurity: Protecting Software-Defined Vehicles
Andre Weimerskirch (Lear)
|
12:00 - 13:30 |
Lunch
|
13:30 - 15:00 |
Session 2: Vulnerabilities und Intrusion Detection
Session Chair: Hans-Joachim HofSecPol: Enabling Security Policy Control in Vehicle Networks using Intrusion Detection and Hardware Trust
Florian Fenzl (Fraunhofer SIT)*; Jonathan Stancke (Fraunhofer SIT); Christian Plappert (Fraunhofer SIT); Roland Rieke (Fraunhofer SIT); Felix Gail (Fraunhofer SIT); Theo Dimitrakos (Huawei Technologies Düsseldorf GmbH); Hussein Joumaa (Huawei Technologies Düsseldorf GmbH) AI-Driven Intrusion Detection Systems (IDS) on the ROAD dataset: A Comparative Analysis for automotive Controller Area Network (CAN)
Lorenzo Guerra (Telecom Paris)*; Van-Tam Nguyen (Telecom Paris - Institut Polytechnique de Paris); Pavlo Mozharovskyi (Telecom Paris); Linhan Xu (Telecom Paris); Paolo Bellavista (University of Bologna); Guillaume Duc (Telecom Paris); Thomas Chapuis (Ampere Software Technology) V2X Misbehavior in Decentralized Notification Basic Service: Considerations for Standardization
Jean-Philippe Monteuuis (Qualcomm)*; Jonathan Petit (Qualcomm); Cong Chen (Qualcomm); Soumya Das (Qualcomm); Mohammad Nekoui (Qualcomm); Seung Yang (Qualcomm) (Un)authenticated Diagnostic Services: A Practical Evaluation of Vulnerabilities in the UDS Authentication Service
Timm Lauser (Darmstadt University of Applied Sciences)*; Gideon Munoz Molto (Darmstadt University of Applied Sciences); Christoph Krauß (Darmstadt University of Applied Sciences)
|
15:00 - 15:30 |
Closing & Coffee Break
|
* Corresponding author.
Call for Papers
Aim of the Event
Industry, as well as academia, have made great advances working towards an overall vision of fully autonomous driving. Despite the success stories, great challenges still lie ahead of us to make this grand vision come true. On the one hand, future systems have to be yet more capable to perceive, reason, and act in complex real-world scenarios. On the other hand, these future systems have to comply with our expectations for robustness, security, and safety.
Workshop Scope
Topics: Submission of contributions are invited in (but not limited to) the following key areas:
- Secure in-vehicle communication and lightweight cryptographic protocols
- System security of electronic control units, gateways etc. (e.g., hardware security, OS security)
- Secure external communication (e.g., V2X, Internet) and protocols (e.g., secure remote update)
- Automotive security standardization, secure software development, security testing
- Automotive security monitoring (e.g., IDS, IPS, SIEM, SOC)
- Privacy-enhancing technologies and mechanisms for automotive applications
- Piracy, product counterfeit, and theft protection (e.g., RKE, Immobilizer)
- Practical security evaluations / penetration testing
- Interaction of safety and security
- New threat due to integration of Artificial Intelligence
- Novel defenses enabled by Artificial Intelligence
- Security of Artificial Intelligence
Submissions
We are looking for papers with high quality, original and unpublished contributions of twelve pages (without references). Note that reviewers are not required to read appendices or any supplementary material. The review process is double-blind. Submissions have to be anonymized.
All papers must be formatted in the double-column ACM format and submitted via the submission system. Authors should not change the font or the margins of the ACM format. Submissions not following the required format may be rejected without review.
Important Dates
All submissions must be received by 11:59 p.m. anywhere-on-earth time on the day of the corresponding deadline.
|
Full paper track |
Submission deadline: |
June 20, 2024
July 4, 2024
|
Notification to authors: |
August 12, 2024 |
Camera ready due: |
August 28, 2024
September 9, 2024
|
Camera-Ready and Conference Presentation
If a paper is accepted, the author list of the initial submission cannot be changed when preparing the camera-ready version. Authors of accepted papers must also guarantee that their papers will be presented at the workshop.
- By submitting your article to an ACM Publication, you are hereby acknowledging that you and your co-authors are subject to all ACM Publications Policies, including ACM’s new Publications Policy on Research Involving Human Participants and Subjects. Alleged violations of this policy or any ACM Publications Policy will be investigated by ACM and may result in a full retraction of your paper, in addition to other potential penalties, as per ACM Publications Policy.
Committee
Program Chairs
Mario Fritz
CISPA Helmholtz Center for Information Security, Germany
Mario Fritz is faculty member at the CISPA Helmholtz Center for Information Security, Saarbruecken, Germany and professor at the Saarland University. Previously, he was senior researcher at the Max Planck Institute for Informatics and post-doc at UC Berkeley and the International Computer Science Institute on a Feodor Lynen Research Fellowship of the Alexander von Humboldt Foundation. His research focus is at the intersection of Artificial Intelligence & Machine Learning with Security & Privacy. His recent work focuses on Deep Learning techniques that allow end-to-end training of complex and multi-modal approaches. He has over 90 publications - 50 in top venues. His key contributions include work on visual domain adaptation, latent factor models, the Visual Turing Test, privacy in visual data, and attack as well as defenses for machine learning models. He has served as area chair for ECCV and ICCV, is associate editor of TPAMI and is member of the ACM Europe Technology Policy Committee.
Christoph Krauß
Darmstadt University of Applied Sciences and INCYDE GmbH
Christoph Krauß is full professor for
Network Security at the Department of Computer Science at Darmstadt
University of Applied Sciences (HDA) and Head of Automotive Security
Research at INCYDE GmbH, which he co-founded. At HDA, he is the spokesperson
of the IT Security Expert Group, head of the research group Applied Cyber
Security Darmstadt (ACSD), and member of the inter-university PhD Center for
Applied Computer Science PZAI. At INCYDE, he coordinates the research
activities and research projects of the automotive sector. He has over 15
years of experience in the area of cyber security. Currently, his fields of
interest and activities are focused on automotive security and privacy,
railway security, intelligent energy networks security, trusted computing,
network security, efficient and post quantum cryptography, and security
engineering.
Hans-Joachim Hof
Technical University of Ingolstadt, Germany
Hans-Joachim Hof is full professor and vice president of Technische Hochschule Ingolstadt, Germany. He leads the research group „Security in Mobility“ in the CARISSMA Institute of Electric, Connected, and Secure Mobility (C-ECOS). His research focus is on the security testing of vehicles as well as on secure automotive software. Previously, Hans-Joachim was a full professor at the Munich University of Applied Sciences, Germany and research scientist at Corporate Technology of Siemens AG, Germany. He holds a PhD from the Karlsruhe Institute of Technology, Germany. Hans-Joachim is a member of the board of the German Chapter of the ACM and of the German national computer science association (Gesellschaft für Informatik).
Web Chairs and Local Organization Chairs
- Dominik Bayerl, Technical University of Ingolstadt, Germany
- Timm Lauser, Darmstadt University of Applied Sciences, Germany
Program Committee
- Alexey Vinel, Karlsruhe Institute of Technology
- Andre Weimerskirch, Lear
- Cosimo Senni Guidotti Magnani, Stellantis
- Dennis Kengo Oka, Synopsys
- Flavio Garcia, University of Birmingham
- Frank Kargl, Universität Ulm
- Gedare Bloom, University of Colorado
- H. Gregor Molter, Dr.-Ing. h.c.F. Porsche AG
- Hongxin Hu, University at Buffalo
- Jeremy Daily, Colorado State University
- John Heldreth, Automotive Security Research Group
- Marc Stöttinger, RheinMain University of Applied Science
- Markus Tschersich, Continental
- Mauro Conti, University of Padua
- Mert Pesé, Clemson University
- Miroslav Pajic, Duke University
- Robert Kaster, University of Michigan
- Shalabh Jain, Bosch
- Stefan Katzenbeisser, University of Passau
- Thomas Forest, General Motors Research
- Tim Leinmüller, Denso
- Timo van Roermund, NXP
Organized by members of