9:15 – 9:30 |
Welcome |
9:30 – 10:30 |
Invited speaker :
Pr. Dieter Gollman

« Industrial Control Systems Security – From SCADA Security to Adversarial Control Theory »
We describe an approach for analysing and attacking the physical part (a process) of a cyber-physical system. The stages of this approach are demonstrated in a case study, a simulation of a vinyl acetate monomer plant. We want to demonstrate in particular where security has to rely on expert knowledge in the domain of the physical components and processes of a system and that there are major challenges for converting cyber attacks into successful cyber-physical attacks.
|
10:30 – 11:00 |
Coffee Break |
Session 1 |
CyberICS Session 1
|
11:00 – 12:50 |
- Danilo Delia, The economics of cybersecurity, from the public good to the revenge of the industry.
- Thuy Nguyen, Mark Gondree and David Reed, Teaching Industrial Control System Security UsingCollaborative Projects
- Andre Rein, Roland Rieke, Michael Jäger, Nicolai Kuntze and Luigi Coppolino, TrustEstablishment in Cooperating Cyber-Physical System.
- Pieter Van Vliet and Nhien An Le Khac, Forensics in Industrial Control System: A Case Study (short paper)
|
12:50 – 14:00 |
Lunch Break |
|
Session 2 |
WOS-CPS Session |
14:00 – 15:30 |
- Bogdan Groza and Cristina Solomon, LiMon, Lightweight Authentication for Tire Pressure Monitoring Sensors
- Travis Finkenauer and J. Alex Halderman, Umbra, Embedded Web Security through Application- Layer Firewalls
- Dinesha Ranathunga, Matthew Roughan, Phil Kernick and Nickolas Falkner, Towards Standardising Firewall Reporting
|
15:30 – 16:00 |
Coffee Break |
Session 3 |
CyberICS Session 2 |
16:00 – 17:50 |
- Alessio Coletta and Alessandro Armando, Security Monitoring for Industrial Control Systems
- Lyes Bayou, David Espes, Nora Cuppens and Frédéric Cuppens, Wireless HART NetSIM: aWireless HART SCADA-Based Wireless Sensor Networks simulator
- Markku Kylänpää and Aarne Rantala, Remote Attestation for Embedded Systems
- Ziad Ismail, Jean Leneutre and Alia Fourati, An Attack Execution Model for Industrial Control Systems Security Assessment (short paper)
|