ABSTRACT
A challenge is to develop cyber-physical system scenarios that reflect the diversity and complexity of real-life cyber-physical systems in the research questions that they address. Time-bounded collaborative events, such as hackathons, jams and sprints, are increasingly used as a means of bringing groups of individuals together, in order to explore challenges and develop solutions. This paper describes our experiences, using a science hackathon to bring individual researchers together, in order to develop a common use-case implemented on a shared CPS testbed platform that embodies the diversity in their own security research questions. A qualitative study of the event was conducted, in order to evaluate the success of the process, with a view to improving future similar events.
- D. Antonioli, H.R. Ghaeini, S. Adepu, M. Ochoa, and N.O. Tippenhauer. 2017. Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3. In Workshop on Cyber-Physical Systems Security and PrivaCy. ACM. Google ScholarDigital Library
- Edwin Bourget et almbox. 2018. Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes. In IFIP WG 11.3 Conference on Data and Applications Security and Privacy . Springer, LNCS 10359.Google Scholar
- Thomas Clédel et almbox. 2018. Towards the evaluation of end-to-end resilience through external consistency. In 10th International Symposium on Cyberspace Safety and Security . Springer LNCS.Google Scholar
- Anna Filippova et almbox. 2017. Hacking and Making at Time-Bounded Events: Current Trends and Next Steps in Research and Event Design. In Conference on Computer Supported Cooperative Work and Social Computing. ACM, 363--370. Google ScholarDigital Library
- S.N. Foley. 2017. Getting Security Objectives Wrong: A Cautionary Tale of an Industrial Control System. In Security Protocols XXV - 25th International Workshop. Springer LNCS 10476.Google Scholar
- Frank J. Frey and Michael Luks. 2016. The Innovation-driven Hackathon: One Means for Accelerating Innovation. In Proceedings of European Conference on Pattern Languages of Programs . ACM. Google ScholarDigital Library
- Francisco Furtada, Lauren Got, Sita Rajagopal, Elaine Cheong, and Ericson Thiang. 2017. S3--17: SUTD Security Showdown (Event Report) . Technical Report. Centre for Research in Cyber Security, Singapore University of Technology and Design.Google Scholar
- Benjamin Green, Anhtuan Le, Rob Antrobus, Utz Roedig, David Hutchison, and Awais Rashid. 2017. Pains, Gains and PLCs: Ten Lessons from Building an Industrial Control Systems Testbed for Security Research. In Workshop on Cyber Security Experimentation and Test, (CSET), Vancouver. USENIX . Google ScholarDigital Library
- D. Groen and B. Calderhead. 2015. Science hackathons for developing interdisciplinary research and collaborations. eLife , Vol. 4 (2015).Google Scholar
- M.A. Jackson. 1989. Getting It Wrong: A Cautionary Tale. In JSP & JSD: The Jackson Approach to Software Development;, John Cameron (Ed.). IEEE CS Press.Google Scholar
- Alexandre Kabil et almbox. 2018. Why should we use 3D Collaborative Virtual Environments for Cyber Security?. In IEEE Fourth VR International Workshop on Collaborative Virtual Environments .Google Scholar
- A. P. Mathur and N. O. Tippenhauer. 2016. SWaT: a water treatment testbed for research and training on ICS security. In 2016 International Workshop on Cyber-physical Systems for Smart Water Networks (CySWater) . 31--36.Google Scholar
- D. C. O'Connell and S. Kowal. 1995. Basic Principles of Transcription. In Rethinking Methods in Psychology. Part II, Discourse as Topic. Sage Publications.Google Scholar
- Olgierd Pieczul, Simon Foley, and Mary Ellen Zurko. 2017. Developer-centered Security and the Symmetry of Ignorance. In Proceedings of the New Security Paradigms Workshop. ACM, 46--56. Google ScholarDigital Library
- J. Richie and J. Lewis (Eds.). 2003. Qualitative Research Practice: A Guide for Social Science Students and Researchers .Sage Publications, London.Google Scholar
- Annika Richterich. 2017. Hacking events: Project development practices and technology use at hackathons. Convergence: The International Journal of Research into New Media Technologies (May 2017), 1--27.Google Scholar
- Walid Taha et almbox. 2016. Acumen: An Open-Source Testbed for Cyber-Physical Systems Research. In Internet of Things. IoT Infrastructures (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering). Springer, 118--130.Google Scholar
- Stefan Wagner. 2014. Scrum for Cyber-physical Systems: A Process Proposal. In Proceedings of the 1st International Workshop on Rapid Continuous Software Engineering (RCoSE 2014). ACM, New York, NY, USA. Google ScholarDigital Library
Index Terms
- Science Hackathons for Cyberphysical System Security Research: Putting CPS testbed platforms to good use
Recommendations
Socio-technical Constraints and Affordances of Virtual Collaboration - A Study of Four Online Hackathons
CSCWHackathons and similar time-bounded events have become a popular form of collaboration in various domains. They are commonly organized as in-person events during which teams engage in intense collaboration over a short period of time to complete a ...
Cyberphysical systems
Essentially, the emerging term CyberPhysical Systems (CPS) is an architectural paradigm in which the pervasive sensing technologies represent a fundamental part. Originally defined in the computer sciences domain, the term CyberPhysical Systems has been ...
Cyberphysical Systems: Workload Modeling and Design Optimization
Built to interact with the physical world, a cyberphysical system (CPS) must be efficient, reliable, and safe. To optimize such systems, a science of CPS design considering workload characteristics (e.g., self-similarity and nonstationarity) must be ...
Comments