Mario Fritz
CISPA Helmholtz Center for Information Security, Germany
We are excited to announce the 1st Cyber Security in Cars Workshop (CSCS), a workshop focused on addressing the complex challenges of cyber security in modern vehicles. This workshop aims to bring together researchers, practitioners, developers, and anyone interested in solving the myriad cyber security problems in the automotive domain. It offers a platform to discuss the latest developments, share current research contributions, and foster networking and collaboration to develop innovative solutions.
The Cyber Security in Cars Workshop (CSCS) is the successor of the ACM Computer Science in Cars Symposium, building upon the foundation laid by its predecessor and further advancing the field of automotive cybersecurity.
09:00 - 9:20 | Opening & Welcome Hans-Joachim Hof (Program Chair) |
09:20 - 10:30 | Session 1: Threat and Security Engineering Session Chair: Timm LauserRevisiting automotive threat analysis by leveraging the elements of the Threat Landscape Alexander Åström (Comentor AB)* Classification, Impact, and Mitigation Strategies of Attacks in Automotive Trust Management Systems Marco Michl (Technische Hochschule Ingolstadt)*; Hans-Joachim Hof (Technical University of Ingolstadt); Stefan Katzenbeisser (University of Passau) Achieving the Safety and Security of the End-to-End AV Pipeline Noah T Curran (University of Michigan)*; Minkyoung Cho (University of Michigan); Ryan T Feng (University of Michigan); Liangkai Liu (University of Michigan); Brian Tang (University of Michigan); Kang G. Shin (The University of Michigan ); Pedram MohajerAnsari (Clemson University); Alkim Domeke (Clemson University); Mert D Pesé (Clemson University) |
10:30 - 11:00 | Coffee Break |
11:00 - 12:00 | Keynote: The Future of Automotive Cybersecurity: Protecting Software-Defined Vehicles Andre Weimerskirch (Lear) |
12:00 - 13:30 | Lunch |
13:30 - 15:00 | Session 2: Vulnerabilities und Intrusion Detection Session Chair: Hans-Joachim HofSecPol: Enabling Security Policy Control in Vehicle Networks using Intrusion Detection and Hardware Trust Florian Fenzl (Fraunhofer SIT)*; Jonathan Stancke (Fraunhofer SIT); Christian Plappert (Fraunhofer SIT); Roland Rieke (Fraunhofer SIT); Felix Gail (Fraunhofer SIT); Theo Dimitrakos (Huawei Technologies Düsseldorf GmbH); Hussein Joumaa (Huawei Technologies Düsseldorf GmbH) AI-Driven Intrusion Detection Systems (IDS) on the ROAD dataset: A Comparative Analysis for automotive Controller Area Network (CAN) Lorenzo Guerra (Telecom Paris)*; Van-Tam Nguyen (Telecom Paris - Institut Polytechnique de Paris); Pavlo Mozharovskyi (Telecom Paris); Linhan Xu (Telecom Paris); Paolo Bellavista (University of Bologna); Guillaume Duc (Telecom Paris); Thomas Chapuis (Ampere Software Technology) V2X Misbehavior in Decentralized Notification Basic Service: Considerations for Standardization Jean-Philippe Monteuuis (Qualcomm)*; Jonathan Petit (Qualcomm); Cong Chen (Qualcomm); Soumya Das (Qualcomm); Mohammad Nekoui (Qualcomm); Seung Yang (Qualcomm) (Un)authenticated Diagnostic Services: A Practical Evaluation of Vulnerabilities in the UDS Authentication Service Timm Lauser (Darmstadt University of Applied Sciences)*; Gideon Munoz Molto (Darmstadt University of Applied Sciences); Christoph Krauß (Darmstadt University of Applied Sciences) |
15:00 - 15:30 | Closing & Coffee Break |
Industry, as well as academia, have made great advances working towards an overall vision of fully autonomous driving. Despite the success stories, great challenges still lie ahead of us to make this grand vision come true. On the one hand, future systems have to be yet more capable to perceive, reason, and act in complex real-world scenarios. On the other hand, these future systems have to comply with our expectations for robustness, security, and safety.
Topics: Submission of contributions are invited in (but not limited to) the following key areas:
We are looking for papers with high quality, original and unpublished contributions of twelve pages (without references). Note that reviewers are not required to read appendices or any supplementary material. The review process is double-blind. Submissions have to be anonymized.
All papers must be formatted in the double-column ACM format and submitted via the submission system. Authors should not change the font or the margins of the ACM format. Submissions not following the required format may be rejected without review.
All submissions must be received by 11:59 p.m. anywhere-on-earth time on the day of the corresponding deadline.
Full paper track | |
---|---|
Submission deadline: |
|
Notification to authors: | August 12, 2024 |
Camera ready due: |
|
If a paper is accepted, the author list of the initial submission cannot be changed when preparing the camera-ready version. Authors of accepted papers must also guarantee that their papers will be presented at the workshop.