CPSIoTSec 2025


October 17th, 2025
Taipei, Taiwan


Queries: Daisuke Mashima, daisuke.mashima[at]ieee.org

The 7th Joint Workshop on
CPS & IoT Security and Privacy

In conjunction with the
ACM Conference on Computer and Communications Security 2025

Background

The Joint Workshop on CPS&IoT Security and Privacy (CPSIoTSec) is the result of the merger of the Workshop on Cyber-Physical Systems Security and Privacy (CPS-SPC) and Workshop on the Internet of Things Security and Privacy (IoTS&P) previously organized annually in conjunction with ACM Conference on Computer and Communications Security.

Scope

The Workshop on CPS&IoT Security and Privacy (CPSIoTSec 2025) invites academia, industry, and governmental entities to submit:

We seek submissions from multiple interdisciplinary backgrounds tackling security and privacy issues in CPS&IoT, including but not limited to:

Also of interest will be papers that can point the research community to new research directions, and those that can set research agendas and priorities in CPS/IoT security and privacy. There will be a best paper award.

Submission Guidelines

Submissions include long papers (12 pages), short papers (6 pages), or 1-page abstracts:

Submitted papers can be up to 12 or 6 pages excluding appendices and references, and should provide enough details to enable reproducibility. All submitted papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references, for double blind reviews. Submissions must use the ACM SIG Proceedings Templates (see https://www.acm.org/publications/proceedings-template, with a simpler version here: https://github.com/acmccs/format). Only PDF files will be accepted.

Accepted papers will be published by the ACM Press and/or the ACM Digital Library. We expect all authors to consider diversity and inclusion, especially when preparing their own submission (see https://www.acm.org/diversity-inclusion/about). Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Each accepted paper must be presented by a registered author. Submissions not meeting these guidelines risk immediate rejection. For questions about these policies, please contact the chairs.

Keynote

Keynote: Daniel Xiapu Luo
Title: The Road Less Hacked: Enhancing Security in Automotive Systems
Abstract: As vehicles transform into complex, interconnected systems, cybersecurity emerges as a paramount concern. This presentation will begin with an examination of the current automotive attack surfaces, exploring how modern vehicles, equipped with advanced connectivity features, are increasingly vulnerable to cyber threats. Following this, we will introduce our recent studies on identifying vulnerabilities in critical automotive components and the design of defense mechanisms.
Bio: Professor in the Department of Computing, Associate Dean (Research) of the Faculty of Computer and Mathematical Sciences, Co-Director of the Research Centre for Blockchain Technology, and Programme Leader of MSc in Blockchain Technology at the Hong Kong Polytechnic University. His research focuses on Mobile and IoT Security, Blockchain and Smart Contracts Security, Network Security and Privacy, and Software Engineering with papers published in top venues. His research led to more than ten best/distinguished paper awards, including ACM CCS'24 Distinguished Paper Award, four ACM SIGSOFT Distinguished Paper Awards, Best DeFi Papers Award 2023, Best Paper Award in INFOCOM'18, Best Research Paper Award in ISSRE'16, etc. and several awards from the industry. He received the BOCHK Science and Technology Innovation Prize (FinTech) 2023 for his contribution to blockchain security. He is an ACM Distinguished Member for his research in safeguarding blockchain and smart contracts along with Android and its applications. He also actively contributes to the community by participating in program/organization committees for major conferences in security, software engineering, and networking, and by serving as an associate editor for prestigious journals such as IEEE/ACM Transactions on Networking (ToN), IEEE Transactions on Dependable and Secure Computing (TDSC), and ACM Transactions on Privacy and Security (TOPS). He is a member of the Hong Kong Monetary Authority’s CBDC Expert Group.

Program

9:20 - 9:30 Opening Remarks, Daisuke Mashima (Singapore University of Technology and Design), Kassem Fawaz (University of Wisconsin Madison)
9:30 Keynote: The Road Less Hacked: Enhancing Security in Automotive Systems. Prof. Xiapu Luo (The Hong Kong Polytechnic University)
Chair: Daisuke Mashima (Singapore University of Technology and Design)
10:30 - 11:00 Morning Coffee Break
11:00 - 11:50 Full Paper Presentation (1) Chair: Asmit Nayak (University of Wisconsin Madison)
Energy-Conscious and Regulation-Ready Security Protocol for Wearable Medical Devices: From Formal Proofs to Deployment. Sidra Anwar, Mouaz Hendi, Jonathan Anderson
CrossGuard: A Cross-Modal Deep Learning Framework for Semantic-Structural Threat Detection utilizing Provenance Graph. Seong-Su Yoon, Hui-Seok Yang, Ieck-Chae Euom
11:50 - 13:30 Lunch
13:30 - 14:45 Full Paper Presentation (2) Chair: Xiapu Luo (The Hong Kong Polytechnic University)
Enabling Confidential I/O on RISC-V Without Hardware Modifications. Gregor Haas, Micheal Chung, David Kohlbrenner
Denial-of-Service Impact Evaluation Testbed for Embedded Devices. Florian Förster, Song Son Ha, Henry Beuster, Thomas Robert Doebbert, Gerd Scholl, Dominik Merli
PUF-based AKE: Attacks, Entropy and Post-Quantum Security. Somnath Panja, Nikita Tripathi, Reihaneh Safavi-Naini
14:45 - 15:15 Afternoon Coffee Break
15:15 - 16:15 Short Papers Chair: Sidra Anwar (Memorial University of Newfoundland, Canada)
Robust Tuning and Evaluation of Flocking Algorithms For Decentralized Swarms of Small Quadrotors. Gabriel Ritter, Rakesh B. Bobba
Towards Behavior Grammar-Driven IoT Network Traffic Generation using MUD Specifications. Shuai Zhang, Shayan Azizi, Aditya Joshi, Gustavo Batista, Hassan Habibi Gharakheili
Towards Label Shift Adaptation for Robust IoT Device Identification. Shayan Azizi, Felipe Vaiano Calderan, Norihiro Okui, Masataka Nakahara, Ayumu Kubota, Marcos Gonçalves Quiles, Gustavo Enrique Batista, Hassan Habibi Gharakheili
Exploring Multi-User Access Control Design in IoT-assisted In-Home Dementia Care. Patrick Jfremov-Kustov, Weijia He
16:15 Closing and Best paper award. Daisuke Mashima, Kassem Fawaz

Important Dates

Program Chairs

Technical Program Committee

Steering Committee

Publicity Chair

Past Workshop