Program

(08:30 — 08:45) Opening and Chairs’ Welcome

(08:45 — 10:00) Session I: Intrusion and anomaly detection

A new burst-based DFA model for SCADA anomaly detection. Chen Markman (Tel-Aviv university); Avishai Wool (Tel-Aviv university); Alvaro Cardenas (University of Texas, Dallas)

From System Specification to Anomaly Detection (and back). Davide Fauri (Eindhoven University of Technology); Daniel Ricardo Dos Santos (Eindhoven University of Technology); Elisa Costante (Security Matters); Jerry den Hartog (Eindhoven University of Technology); Sandro Etalle (Eindhoven University of Technology); Stefano Tonetta (Fondazione Bruno Kessler)

Automatic Deployment of Specification-based Intrusion Detection in the BACnet Protocol. Herson Esquivel-Vargas (University of Twente); Marco Caselli (Siemens AG); Andreas Peter (University of Twente)

(10:00 — 10:45) Coffee Break

(10:45 — 12:00) Session II: Attacks

Jumping the Air Gap: Modeling Cyber-Physical Attack Paths in the Internet-of-Things. Ioannis Agadakos (Stevens Institute of Technology); Chien-Ying Chen (University of Illinois at Urbana-Champaign); Matteo Campanelli (The City College of New York); Prashant Anantharaman (Dartmouth College); Monowar Hasan (University of Illinois at Urbana-Champaign); Bogdan Copos (SRI International); Tancrède Lepoint (SRI International); Michael Locasto (SRI International); Gabriela F. Ciocarlie (SRI International); Ulf Lindqvist (SRI International)

Developing Models for Physical Attacks in Cyber-Physical Systems [Short Paper]. Carmen Cheh (University of Illinois at Urbana-Champaign); Ken Keefe (University of Illinois at Urbana-Champaign); Brett Feddersen (University of Illinois at Urbana-Champaign); Binbin Chen (Advanced Digital Sciences Center); William G. Temple (Advanced Digital Sciences Center); William H. Sanders (University of Illinois at Urbana-Champaign)

On the Significance of Process Comprehension for Conducting Targeted ICS Attacks. Benjamin Green (Lancaster University); Marina Krotofil (Honeywell Industrial Cyber Security Lab); Ali Abbasi (University of Twente)

(Noon — 13:30) Lunch

(13:30 — 15:00) Session III: Threat Analysis and Risk Assessment

CPSA: A Cyber-Physical Security Assessment Tool for Situational Awareness in Smart Grid. Neetesh Saxena (Georgia Institute of Technology, USA); Victor Chukwuka (Georgia Institute of Technology, USA); Leilei Xiong (Georgia Institute of Technology, USA); Santiago Grijalva (Georgia Institute of Technology, USA)

Cyber Threat Analysis Framework for the Wind Energy Based Power System. Amarjit Datta (Tennessee Technological University); Mohammad Rahman (Tennessee Technological University)

Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3. Daniele Antonioli (Singapore University of Technology and Design); Hamid Reza Ghaeini (Singapore University of Technology and Design); Sridhar Adepu (Singapore University of Technology and Design); Martín Ochoa (Singapore University of Technology and Design); Nils Ole Tippenhauer (Singapore University of Technology and Design)

"How Long is a Piece of String": Defining Key Phases and Observed Challenges within ICS Risk Assessment [Short Paper]. Benjamin Green (Lancaster University); Daniel Prince (Lancaster University); Jerry Busby (Lancaster University); David Hutchison (Lancaster University)

(15:00 — 15:45) Coffee Break

(15:45 — 16:45) Session IV: Analysis and Verification

Remote Proofs of Video Freshness for Public Spaces. Junia Valente (University of Texas, Dallas); Alvaro Cardenas (University of Texas, Dallas)

Secure and Privacy-Preserving Average Consensus [Short Paper]. Minghao Ruan (Clemson University); Muaz Ahmad (Clemson University); Yongqiang Wang (Clemson University)

Integrating design and data centric approaches to generate invariants for distributed attack detection [Short Paper]. Muhammad Azmi Umer (DHA Suffa University, Karachi and Karachi Institute of Economics and Technology, Pakistan); Aditya Mathur (Singapore University of Technology and Design); Khurum Nazir Junejo (Karachi Institute of Economics and Technology, Pakistan); Sridhar Adepu (Singapore University of Technology and Design).

(16:45 — 17:00) Closing Remarks