Goals

CyberICPS is the result of the merging of the CyberICS and WOS-CPS workshops that were held for the first time in conjunction with ESORICS 2015. Cyber-physical systems (CPS) are physical and engineered systems that interact with the physical environment, whose operations are monitored, coordinated, controlled and integrated by information and communication technologies. These systems exist everywhere around us, and range in size, complexity and criticality, from embedded systems used in smart vehicles, to SCADA systems in smart grids to control systems in water distribution systems, to smart transportation systems, to plant control systems, engineering workstations, substation equipment, programmable logic controllers (PLCs), and other Industrial Control Systems (ICS). As ICS and CPS proliferate, and increasingly interact with us and affect our life, their security becomes of paramount importance. CyberICPS intends to bring together researchers, engineers and governmental actors with an interest in the security of ICS and CPS in the context of their increasing exposure to cyber-space, by offering a forum for discussion on all issues related to their cyber security.

Topics

CyberICPS invites submissions that present innovative ideas, proof of concepts, use cases, and results from a variety of topics relevant to ICS and CPS, including (but not limited to) the following ones:

    Security Governance

  • Security policies
  • Risk analysis and management
  • Vulnerability assessment and metrics
  • Awareness, training and simulation
  • ICS/CPS security standards
  • Privacy and Anonymity in ICS/CPS
  • System and Network Security

  • Threat modeling
  • Security architectures
  • Access control
  • Malware and cyber weapons
  • Intrusion detection and visualisation
  • Defense in depth
  • Monitoring and real time supervision
  • Applied cryptography
  • Perimeter security


  • Safety-security interactions
  • Cyber security engineering
  • Secure communication protocols
  • Formal models for ICS/CPS security
  • Hardware Security
  • Resilient ICS/CPS
  • Application Security
  • Secure Firmware
  • Incident Response and Digital Forensics for ICS/CPS

  • Forensics in ICS
  • Incident Response
  • Accountability

    Case Studies

  • Case studies in the energy, utility, chemical, transportation, manufacturing, and other industrial and critical infrastructure sectors.

Program Committee Chairs

Sokratis Katsikas

Norwegian University of Science and Technology - NTNU, Norway

University of Piraeus, Greece

Frederic Cuppens

IMT Atlantique, France



General Chairs

Nora Cuppens

IMT Atlantique, France

Costas Lambrinoudakis

University of Piraeus, Greece




Technical Program Committee

Cristina Alcaraz

University of Malaga, Spain

Samiha Ayed

Devoteam, France

Mauro Conti

University of Padua, Italy

Mourad Debbabi

Concordia University, Canada

Hervé Debar

Telecom Sudparis, France

David Espes

University of Brest, France

Joaquin Garcia-Alfaro

Telecom SudParis, France

Dieter Gollmann

Technical University of Hamburg, Germany

Wael Kanoun

Nokia, France

Jean Leneutre

Telecom ParisTech, France

Javier Lopez

University of Malaga, Spain

Masahiro Mambo

Kanazawa University, Japan

Sjouke Mauw,

University of Luxembourg, Luxembourg

Weizhi Meng

Institute for Infocomm Research, Singapore

Chris Mitchell

Royal Holloway, UK

Jonathan Petit

Security Innovation, USA

Juha Röning

University of Oulu, Finland

Yves Roudier

EURECOM, France

Pierangela Samarati

Università degli Studi di Milano, Italy

Radu State

University of Luxembourg, Luxembourg

Houbling Song

West Virginia University, USA

Craig Valli

Edith Cowan University, Australia

Jozef Vyskoc

VAF, Slovakia

Khan Ferdous Wahid

Airbus Defence and Space GmbH, Germany

Stephen Wolthusen

Royal Holloway, UK

Stefano Zanero

Politecnico di Milano, Italy



Submission Details

Submitted papers must not substantially overlap with papers that have been published or that have been simultaneously submitted to a journal or a conference with proceedings. Submissions should be at most 16 pages long, including the bibliography and well-marked appendices, and should follow the LNCS style. Submissions are to be made to the submission web site. Only pdf files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Papers must be received by the deadline of July the 9th, 2017 (11:59 p.m. American Samoa time). Authors of accepted papers must guarantee that their papers will be presented at the workshop. Pre-proceedings will be made available at the workshop. All accepted papers will be published as joint post-proceedings by Springer in the Lecture Notes in Computer Science (LNCS) series.

For further inquiries, please contact one of the program committee chairs at:
frederic.cuppens[at]imt-atlatique.fr or sokratis.katsikas[at]ntnu.no
Submit Paper Download CfP

Important Dates

Submission Deadline

20 June 2017

9 July 2017

Notification To Authors

20 July 2017

6 August 2017

Camera-Ready Version

31 July 2017

27 August 2017

Programme

    Friday, September 15, 2017

  • 09:00 – 10:30 Session 1: Protecting Industrial Control and Cyber-Physical Systems
  • • Towards End-to-End Data Protection in Low Power Networks.
    Vasily Mikhalev, Laurent Gomez, Frederik Armknecht and José Márquez.

    • Development of an Embedded Platform for Secure CPS Services. file_download
    Vincent Raes, Vincent Naessens and Jan Vossaert.

    • Introducing Usage Control in MQTT protocol for IoT. file_download
    Antonio La Marra, Fabio Martinelli, Paolo Mori, Athanasios Rizos and Andrea Saracino. (SHORT PAPER)

  • 10:30 – 11:00 Coffee Break
  • 11:00 – 12:30 Session 2: Threats, Vulnerabilities and Risks
  • • Towards security threats that matter. file_download
    Katja Tuma, Riccardo Scandariato, Mathias Widman and Christian Sandberg.

    • A Methodology to Assess Vulnerabilities and Countermeasures Impact on the Missions of a Naval System. file_download
    Bastien Sultan, Fabien Dagnat and Caroline Fontaine.

    • STRIDE to a secure Smart Grid in a hybrid cloud. file_download
    Bojan Jelacic, Daniela Rosic, Imre Lendak, Marina Stanojevic and Sebastijan Stoja.

  • 12:30 – 14:00 Lunch Break
  • 14:00 – 15:30 Session 3: Cyber Attacks in Industrial Control and Cyber-Physical Systems
  • • Stealthy Deception Attacks Against SCADA Systems. file_download
    Amit Kleinmann, Avishai Wool, Ori Amichay, David Tenenbaum, Ofer Bar and Leonid Lev.
    • On Ladder Logic Bombs in Industrial Control Systems. file_download
    Naman Govil, Anand Agrawal and Nils Ole Tippenhauer.

    • Enforcing Memory Safety in Cyber-Physical Systems. file_download
    Eyasu Getahun Chekole, John Henry Castellanos, Martín Ochoa and David Yau.

  • 15:30 – 16:00 Coffee Break
  • 16:00 – 17:30 Session 4: Detecting Attacks in Industrial Control and Cyber-Physical Systems
  • • Supporting the Human in Cyber Defence.
    Kirsi Helkala, Benjamin J. Knox, Øyvind Jøsok, Rigardo G. Lugo, Stefan Sütterlin, Geir Olav Dyrkolbotn and Nils Kalstad Svendsen.
    • CRBP-OpType: A Constrained Approximate Search Algorithm for Detecting Similar Attack Patterns. file_download
    Ambika Shrestha Chitrakar and Slobodan Petrovic.
    • Multistage Downstream Attack Detection in a Cyber Physical System.
    Rizwan Qadeer, Carlos Murguia, Chuadhry Mujeeb Ahmed and Justin Ruths. (SHORT PAPER)

Other Info

For further inquiries, please contact one of the program committee chairs at:

frederic.cuppens[at]imt-atlatique.fr or sokratis.katsikas[at]ntnu.no