Critical infrastructures (CI) are technical systems that are designed to distribute energy, information, water, goods and people, and are essential for the quality of everyday life. A major disturbance in services provided by the critical infrastructures can result in a severe strain on business, government and society in general. Furthermore, critical infrastructures often constitute a variety of hardware, software and communication technologies. However, their deployment is a large-scale and costly effort. Therefore, methods, techniques, tools and recommendations related to the implementation of critical infrastructures based on quality perspectives (security, safety, reliability, robustness, privacy, legal topics) are essential. Special considerations should be also given to secure communication, data manipulation (including storing and processing) and overseeing the entire infrastructure. Additionally, an ability to extract the essence of current critical infrastructures into models, which will enable simulation of their behaviour under stress from different circumstances that can emerge in the future is important. This would allow detection of weak and strong spots of these infrastructures before their implementation, and effectively also the prevention of the weak ones.
In this track, we aim to provide a platform for discussing approaches, models, results and case studies or experience reports addressing a broad range of issues related to critical infrastructures. Research challenges include how to design, build and deploy critical infrastructures and the impact on performance. Papers can include and discuss various research methods and can be based on case studies, quantitative and quantitative methods, design science as well as experiments and simulation. In addition, practical oriented research and experience reports are encouraged.
The conference covers the development, assessment, operation, and maintenance of critical infrastructures. Main topics include, but are not limited to:
Model-based dependability analysis, design, and assessment
Testing, verification, and validation methods and tools for critical infrastructures
Qualification, assurance, and certification methods and tools
System-of-systems paradigm in critical infrastructure analysis and design
Fault detection, tolerance, and recovery mechanisms
Resilient and fault-tolerant hardware and software architectures
Distributed and real-time monitoring and control
Risk assessment in critical infrastructures
Digital forensics in critical infrastructures
Data-driven techniques for engineering dependable systems
Cyber-physical threats and vulnerability analysis
Safety and security guidelines, standards, and certification
Deployment of IoT for critical services
Identification of system bottlenecks and points of failure
Legal compliance tools and techniques, cybersecurity and privacy requirements
We welcome original unpublished work in areas related to critical infrastructures. The submitted manuscripts should present a substantial contribution. We welcome research papers as well as reports on innovative industrial applications and tools. We allow submission in the following categories:
Full papers are limited to a maximum of 10 pages. (8 pages are included in the conference registration + up to 2 additional pages at extra charge of $80 USD per page).
Posters are limited to a maximum o 4 pages (3 pages are included in the conference registration + up to 1 additional page at extra charge of $80 USD per page).
Student Research Competition(SRC): Graduate students seeking feedback from the scientific community on their research ideas are invited to submit abstracts of their original unpublished and in-progress research work (max 4 pages). Submission of the same abstract to multiple tracks is not allowed. Authors of selected abstracts will have the opportunity to share and discuss their research work through poster and oral presentations and compete for the three top-winning places as selected by the SRC committee. The winners will receive cash awards and SIGAPP recognition certificates. Furthermore, invited authors are eligible to apply for the SIGAPP Student Travel Award Program (STAP) for support. SRC abstracts are limited to 4 pages and submitted via SAC 2022 Webpage (http://www.sigapp.org/sac/sac2022/). Please visit https://src.acm.org/ for more information about SRC.
For full submission guidelines and the submission website, please follow the instructions on the ACM SAC 2022 website carefully.
All submissions will be subjected to a double-blind review. Therefore, all submissions must be appropriately anonymized as follows: Author’s names and affiliations are not visible anywhere in the paper. Acknowledgments should be anonymized or removed during the review process. Self-citations should be included where necessary but must use the third person.