The International Workshop on Security and Privacy in Intelligent Infrastructures 2024 (SP2I’24) aims to collect the most relevant ongoing research efforts in privacy and security in intelligent infrastructures.
KEYNOTES
In “On Value of Large-Scale Blackbox Analysis of Software and Hardware Cryptographic Implementations”, Petr Svenda presented lessons from large-scale analysis of cryptographic smart cards, Trusted Platform Modules, cryptographic libraries, and cryptocurrency hardware wallets. The results can be used to reason about the weaknesses of the whole ecosystem instead of just reporting a single vulnerable device.
In “IoT Discovery as the Fundamental Basis for AI Guided Penetration Testing,” Heribert Vallant explained the challenges of automated solutions for new device discovery and AI-guided pen testing in IoT environments.
RESEARCH PRESENTATIONS (CHESS Cyber-Security Excellence Hub-related)
Lukas Malina, Petr Dzurenda, Norbert Lővinger, Faustina Ijeoma Eke, and Raimundas Matulevicius consider “Secure and Privacy-Preserving Car-Sharing Systems”. They discuss the problems with the transparency of services, users’ personal data collection, and how the legislation manages these issues.
DOI: https://doi.org/10.1145/3664476.3670443
Mubashar Iqbal, Sabah Suhail, and Raimundas Matulevicius propose “DECEPTWIN: Proactive Security Approach for IoV by Leveraging Deception-based Digital Twins and Blockchain” to hunt for the IoV security threats before an incident or breach occurs.
DOI: https://doi.org/10.1145/3664476.3670473
OTHER RESEARCH PRESENTATIONS
S. Ricci, V. Shapoval, P. Dzurenda, P. Roenne, J. Oupicky, L. Malina (2024) Lattice-based Multisignature Optimization for RAM Constrained Devices
DOI: https://doi.org/10.1145/3664476.3670461
L. Malina, P. Dobiáš, P. Dzurenda, G.am Srivastava (2024): Quantum-Resistant and Secure MQTT Communication
DOI: https://doi.org/10.1145/3664476.3670463
V. A. Phan, J. Jeřábek, L. Malina (2024): Comparison of Multiple Feature Selection Techniques for Machine Learning-Based Detection of IoT Attacks
DOI: https://doi.org/10.1145/3664476.3670440
O. Pospisil, R. Fujdiak (2024): Identification of industrial devices based on payload
DOI: https://doi.org/10.1145/3664476.3670462
P. G. Wagner, Pascal Birnstill, J.Beyerer (2024): DDS Security+: Enhancing the Data Distribution Service With TPM-based Remote Attestation
DOI: https://doi.org/10.1145/3664476.3670442