Important Dates

Submission Deadline

August 20, 2024

Acceptance Notification

September 15, 2024

Final version due

September 20, 2024

Scope

Critical systems - the lifeblood of modern society – such as energy grid, manufacturing, supply chain and space technologies, are undergoing a major transformation driven by digital technologies. Automation and autonomous decision-making promise to streamline operations, optimize resource allocation, and enable real-time monitoring and control. However, this transformation is a double-edged sword. While these advancements unlock significant efficiency gains, they also introduce new vulnerabilities.

Increased reliance on connectivity creates a broader attack surface for cybercriminals to exploit. Hackers can target vulnerabilities in connected devices, software, and communication protocols, potentially causing widespread disruption and catastrophic consequences. This workshop serves as a forum to explore these challenges and opportunities. We invite researchers and practitioners to submit papers on security, privacy and trust in critical systems and infrastructures.

We welcome submissions that address the unique challenges faced by a wide range of critical systems. This year we will focus on energy, manufacturing, supply chains and space technologies. However, we also welcome research on security and resiliency of other critical systems, such as nuclear facilities, next generation microreactors, chemical reactors, vital water treatment facilities, and the transportation sector with its growing adoption of electric vehicles and autonomous driving technologies.

Topics

Topics of interest include, but are not limited to:

Threat modeling to identify and mitigate security risks in critical infrastructure
Supply chain security
Secure and resilient space systems and technologies
Cyber-informed engineering, secure by design, and resilient engineering systems design
Artificial intelligence (AI) for securing vs. exploiting AI in critical infrastructure
Adversarial machine learning attacks and defenses in critical infrastructure
Intrusion detection techniques for critical infrastructure
Risk assessment and mitigation for critical infrastructure security
Potential of emerging technologies for critical infrastructure security
Trust assessment and management in critical infrastructure
Operational Technology (OT) security and resiliency
Secure and resilient IT-OT integration

Submission

Workshop papers should not exceed six pages, including references. Standard IEEE conference paper format should be used. The IEEE two-column conference template that can be downloaded from here: 📥


Submissions should be made to EasyChair: Submission

Workshop Panel Information

Check Full List of the Panel

Workshop Program Informtaion

Check the Program Detail

Workshop Registration

Please registrate here

Contact

For questions, please contact the workshop organizers:

...

Mai Abdelhakim

University of Pittsburgh

Workshop Co-Chair

maia@pitt.edu

...

Mohan Baruwal Chhetri

CSIRO

Workshop Co-Chair

mohan.baruwalchhetri@data61.csiro.au

...

Peilin He

University of Pittsburgh

Web Chair

peilin.he@pitt.edu