skip to main content
10.1145/3264888.3264897acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
short-paper

Science Hackathons for Cyberphysical System Security Research: Putting CPS testbed platforms to good use

Published:15 January 2018Publication History

ABSTRACT

A challenge is to develop cyber-physical system scenarios that reflect the diversity and complexity of real-life cyber-physical systems in the research questions that they address. Time-bounded collaborative events, such as hackathons, jams and sprints, are increasingly used as a means of bringing groups of individuals together, in order to explore challenges and develop solutions. This paper describes our experiences, using a science hackathon to bring individual researchers together, in order to develop a common use-case implemented on a shared CPS testbed platform that embodies the diversity in their own security research questions. A qualitative study of the event was conducted, in order to evaluate the success of the process, with a view to improving future similar events.

References

  1. D. Antonioli, H.R. Ghaeini, S. Adepu, M. Ochoa, and N.O. Tippenhauer. 2017. Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3. In Workshop on Cyber-Physical Systems Security and PrivaCy. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Edwin Bourget et almbox. 2018. Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes. In IFIP WG 11.3 Conference on Data and Applications Security and Privacy . Springer, LNCS 10359.Google ScholarGoogle Scholar
  3. Thomas Clédel et almbox. 2018. Towards the evaluation of end-to-end resilience through external consistency. In 10th International Symposium on Cyberspace Safety and Security . Springer LNCS.Google ScholarGoogle Scholar
  4. Anna Filippova et almbox. 2017. Hacking and Making at Time-Bounded Events: Current Trends and Next Steps in Research and Event Design. In Conference on Computer Supported Cooperative Work and Social Computing. ACM, 363--370. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S.N. Foley. 2017. Getting Security Objectives Wrong: A Cautionary Tale of an Industrial Control System. In Security Protocols XXV - 25th International Workshop. Springer LNCS 10476.Google ScholarGoogle Scholar
  6. Frank J. Frey and Michael Luks. 2016. The Innovation-driven Hackathon: One Means for Accelerating Innovation. In Proceedings of European Conference on Pattern Languages of Programs . ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Francisco Furtada, Lauren Got, Sita Rajagopal, Elaine Cheong, and Ericson Thiang. 2017. S3--17: SUTD Security Showdown (Event Report) . Technical Report. Centre for Research in Cyber Security, Singapore University of Technology and Design.Google ScholarGoogle Scholar
  8. Benjamin Green, Anhtuan Le, Rob Antrobus, Utz Roedig, David Hutchison, and Awais Rashid. 2017. Pains, Gains and PLCs: Ten Lessons from Building an Industrial Control Systems Testbed for Security Research. In Workshop on Cyber Security Experimentation and Test, (CSET), Vancouver. USENIX . Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. Groen and B. Calderhead. 2015. Science hackathons for developing interdisciplinary research and collaborations. eLife , Vol. 4 (2015).Google ScholarGoogle Scholar
  10. M.A. Jackson. 1989. Getting It Wrong: A Cautionary Tale. In JSP & JSD: The Jackson Approach to Software Development;, John Cameron (Ed.). IEEE CS Press.Google ScholarGoogle Scholar
  11. Alexandre Kabil et almbox. 2018. Why should we use 3D Collaborative Virtual Environments for Cyber Security?. In IEEE Fourth VR International Workshop on Collaborative Virtual Environments .Google ScholarGoogle Scholar
  12. A. P. Mathur and N. O. Tippenhauer. 2016. SWaT: a water treatment testbed for research and training on ICS security. In 2016 International Workshop on Cyber-physical Systems for Smart Water Networks (CySWater) . 31--36.Google ScholarGoogle Scholar
  13. D. C. O'Connell and S. Kowal. 1995. Basic Principles of Transcription. In Rethinking Methods in Psychology. Part II, Discourse as Topic. Sage Publications.Google ScholarGoogle Scholar
  14. Olgierd Pieczul, Simon Foley, and Mary Ellen Zurko. 2017. Developer-centered Security and the Symmetry of Ignorance. In Proceedings of the New Security Paradigms Workshop. ACM, 46--56. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. Richie and J. Lewis (Eds.). 2003. Qualitative Research Practice: A Guide for Social Science Students and Researchers .Sage Publications, London.Google ScholarGoogle Scholar
  16. Annika Richterich. 2017. Hacking events: Project development practices and technology use at hackathons. Convergence: The International Journal of Research into New Media Technologies (May 2017), 1--27.Google ScholarGoogle Scholar
  17. Walid Taha et almbox. 2016. Acumen: An Open-Source Testbed for Cyber-Physical Systems Research. In Internet of Things. IoT Infrastructures (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering). Springer, 118--130.Google ScholarGoogle Scholar
  18. Stefan Wagner. 2014. Scrum for Cyber-physical Systems: A Process Proposal. In Proceedings of the 1st International Workshop on Rapid Continuous Software Engineering (RCoSE 2014). ACM, New York, NY, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Science Hackathons for Cyberphysical System Security Research: Putting CPS testbed platforms to good use

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CPS-SPC '18: Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy
          October 2018
          114 pages
          ISBN:9781450359924
          DOI:10.1145/3264888

          Copyright © 2018 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 15 January 2018

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • short-paper

          Acceptance Rates

          CPS-SPC '18 Paper Acceptance Rate22of10submissions,220%Overall Acceptance Rate53of66submissions,80%

          Upcoming Conference

          CCS '24
          ACM SIGSAC Conference on Computer and Communications Security
          October 14 - 18, 2024
          Salt Lake City , UT , USA

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader