CyberICPS is the result of the merging of the CyberICS and WOS-CPS workshops that were held for the first time in conjunction with ESORICS 2015.

Cyber-physical systems (CPS) are physical and engineered systems that interact with the physical environment, whose operations are monitored, coordinated, controlled and integrated by information and communication technologies. These systems exist everywhere around us, and range in size, complexity and criticality, from embedded systems used in smart vehicles, to SCADA systems in smart grids to control systems in water distribution systems, to smart transportation systems, to plant control systems, engineering workstations, substation equipment, programmable logic controllers (PLCs), and other Industrial Control Systems (ICS). These systems also include the emerging trend of Industrial Internet of Things (IIoT) that will be the central part of the fourth industrial revolution.

As ICS and CPS proliferate, and increasingly interact with us and affect our life, their security becomes of paramount importance. CyberICPS intends to bring together researchers, engineers and governmental actors with an interest in the security of ICS and CPS in the context of their increasing exposure to cyber-space, by offering a forum for discussion on all issues related to their cyber security.


CyberICPS invites submissions that present innovative ideas, proof of concepts, use cases, and results from a variety of topics relevant to ICS and CPS, including (but not limited to) the following ones:

    Security Governance

  • Security policies
  • Risk analysis and management
  • Vulnerability assessment and metrics
  • Awareness, training and simulation
  • ICS/CPS security standards
  • Privacy and Anonymity in ICS/CPS
  • System and Network Security

  • Threat modeling
  • Security architectures
  • Access control
  • Malware and cyber weapons
  • Intrusion detection and visualisation
  • Defense in depth
  • Monitoring and real time supervision
  • Applied cryptography
  • Perimeter security

  • Safety-security interactions
  • Cyber security engineering
  • Secure communication protocols
  • Formal models for ICS/CPS security
  • Hardware Security
  • Resilient ICS/CPS
  • Application Security
  • Secure Firmware
  • Incident Response and Digital Forensics for ICS/CPS

  • Forensics in ICS
  • Incident Response
  • Accountability

    Case Studies

  • Case studies in the energy, utility, chemical, transportation, manufacturing, and other industrial and critical infrastructure sectors.

Program Committee Chairs

Nora Cuppens

IMT Atlantique, France

Costas Lambrinoudakis

University of Piraeus, Greece

General Chairs

Sokratis Katsikas

Open University of Cyprus, Cyprus

Norwegian University of Science and Technology - NTNU, Norway

Frederic Cuppens

IMT Atlantique, France

Technical Program Committee

Cristina Alcaraz

University of Malaga, Spain

Samiha Ayed

University of Technology of Troyes, France

Mauro Conti

University of Padua, Italy

David Espes

University of Brest, France

Joaquin Garcia-Alfaro

Telecom SudParis, France

Vasileios Gkioulos

Norwegian University of Science and Technology, Norway

Dieter Gollmann

Hamburg University of Technology, Germany

Youssef Laarouchi

EDF R&D, France

Masahiro Mambo

Kanazawa University, Japan

Sjouke Mauw,

University of Luxembourg, Luxembourg

Weizhi Meng

Technical Universtiy of Denmark, Denmark

Chris Mitchell

Royal Holloway, University of London, UK

Pankaj Pandey

Center for Cyber and Information Security (CCIS), Norwegian University of Science and Technology, Norway

Yves Roudier

University of Nice Sophia Antipolis, France

Houbling Song

Embry-Riddle Aeronautical University, USA

Georgios Spathoulas

University of Thessaly, Greece

Radu State

University of Luxembourg, Luxembourg

Khan Ferdous Wahid

Airbus Group, Germany

Stefano Zanero

Politecnico di Milano, Italy

Submission Details

Submitted papers must not substantially overlap with papers that have been published or that have been simultaneously submitted to a journal or a conference with proceedings. Submissions should be at most 16 pages long, including the bibliography and well-marked appendices, and should follow the LNCS style. Submissions are to be made to the submission web site. Only pdf files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Papers must be received by the deadline of July the 8th, 2018 (11:59 p.m. American Samoa time). Authors of accepted papers must guarantee that their papers will be presented at the workshop. Pre-proceedings will be made available at the workshop.

For further inquiries, please contact one of the program committee chairs at:
nora.cuppens[at]imt-atlantique.fr or clam[at]unipi.gr
Submit Paper

Important Dates

Submission Deadline

24 June 2018

8 July 2018

Notification To Authors

20 July 2018

31 July 2018

Camera-Ready Version

20 July 2018



    Thursday, 6 September, 2018

  • 13:45 - 15:45 || Session 1: Cyber-Physical Systems Security
  • • Improving SIEM for Critical SCADA Water Infrastructures Using Machine Learning.
    Hanan Hindy, David Brosset, Ethan Bayne, Amar Seeam and Xavier Bellekens.

    • Cyber-attacks against the autonomous ship.
    Georgios Kavallieratos, Sokratis Katsikas and Vasileios Gkioulos.

    • EPIC: An Electric Power Testbed for Research and Training in Cyber Physical Systems Security.
    Sridhar Adepu, Nandha Kumar Kandasamy and Aditya Mathur.

    • Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing.
    Lamya Abdullah, Felix Freiling, Juan Quintero and Zinaida Benenson.

  • 15:45 - 16:00 || Coffee Break

  • 16:00 - 18:00 || Session 2: Security and Privacy Issues in Architectures and Systems
  • • Understanding challenges to adoption of the Protection Poker software security game.
    Inger Anne Tøndel, Martin Gilje Jaatun, Daniela Cruzes and Tosin Daniel Oyetoyan.

    • A Hardware Based Solution for Freshness of Secure Onboard Communication in Vehicles.
    Sigrid Guergens and Daniel Zelle.

    • Enhancing Usage Control for Performance: An Architecture for Systems of Systems.
    Vasileios Gkioulos, Athanasios Rizos, Christina Michailidou and Paolo Mori.
    • A General scheme for CTI Representation in Privacy-Preserving Data Analysis.
    Fabio Martinelli, Oleksii Osliak and Andrea Saracin.

    Friday, 7 September, 2018

  • 09:00 - 10:00 || Session 1: Machine Learning Based Solutions
  • • An experimental evaluation of bow-tie analysis for cybersecurity requirements.
    Per Håkon Meland, Karin Bernsmed, Christian Frøystad, Jingyue Li and Guttorm Sindre.

    • Comparative study of machine learning methods for in-vehicle intrusion detection.
    Ivo Berger, Roland Rieke, Maxim Kolomeets, Andrey Chechulin and Igor Kotenko.

  • 10:00 - 11:00 || Keynote Speaker

  • 11:00 - 11:30 || Coffee Break

  • 11:30 - 13:00 || Session 2: Data Oriented Security and Privacy Solutions
  • • SDN-enabled virtual data diode.
    Miguel Borges de Freitas, Luis Rosa, Tiago Cruz and Paulo Simões.

    • Towards Run-Time Monitoring of Data Handling Violations.
    Jassim Happa, Nick Moffat and Michael Goldsmith and Saddie Creese.

    • Realistic Data Generation for Anomaly Detection in Industrial Settings using Simulations.
    Peter Schneider and Alexander Giehl.

Other Info

For further inquiries, please contact one of the program committee chairs at:

nora.cuppens[at]imt-atlantique.fr or clam[at]unipi.gr