Annual Industrial Control System Security (ICSS) Workshop

Agenda   •   Proceedings

The Industrial Control System Security Workshop will be held in Orlando, Florida, Tuesday, December 5, 2017, in conjunction with the Annual Computer Security Applications Conference (ACSAC). ACSAC will be held at the Hilton Lake Buena Vista, Orlando, Florida.

Supervisory control and data acquisition (SCADA) and industrial control systems monitor and control a wide range of industrial and infrastructure processes such as water treatment, power generation and transmission, oil and gas refining and steal manufacturing. Such systems are usually built using a variety of commodity computer and networking components, and are becoming increasingly interconnected with corporate and other Internet-visible networks. As a result, they face significant threats from internal and external actors. For example, in 2010 the Stuxnet malware was specifically written to attack SCADA systems and caused millions of dollars in damages.

The critical requirement for high availability in SCADA and industrial control systems, along with the use of resource constrained computing devices, legacy operating systems and proprietary software applications limits the applicability of traditional information security solutions. The goal of this workshop is to explore new security techniques that are applicable in the control systems context. Papers of interest including (but not limited to) the following subject categories are solicited:

  • Intrusion detection and prevention
  • Malware
  • Vulnerability analysis and risk management
  • Digital forensics
  • Virtualization
  • Application security
  • Performance evaluation of security methods and tools in control systems
  • Cybersecurity Education

Submissions

Submissions should be 5-8 pages, using the new ACM 2017 acmart templatepavailable at http://www.acm.org/sigs/publications/proceedings-templates, using the [sigconf, anonymous] options. Submissions should not use older ACM templates (e.g., sig-alternate). If you encounter any problems with the acmart template, please contact acmtexsupport@aptaracorp.com. You can also report problems with the template to https://github.com/borisveytsman/acmart/issues so that they are reviewed by SIG volunteers.

Submissions do not need to be anonymous. Submission website is at https://easychair.org/conferences/?conf=icss17. The accepted workshop papers will be published by ACM. The slides will be published on the ACSAC website.

Important Dates

Submission Deadline:September 24, 2017
Acceptance Notification:October 25, 2017
Final Manuscript due:November 7, 2017
Workshop Date:December 5, 2017

Organizing Committees

General Co-Chairs:
Harvey Rubinovitz, The MITRE Corporation
Adam Hahn, Washington State University

Program Chair
Irfan Ahmed, The University of New Orleans

Program Committee Members include:
Sajal Bhatia, Sacred Heart University
Alvaro Cardenas, University of Texas at Dallas
Ernest Foo, Queensland University of Technology, Australia
Sye Loong Keoh, University of Glasgow
Tommy Morris, University of Alabama in Huntsville
Bradley Schatz, Schatz Forensic
Vassil Roussev, University of New Orleans
Julian Rrushi, Western Washington University
Saman Zonous, Rutgers University

Publicity Chair:
Nishchal Kush, Queensland University of Technology

Workshop Registration

If you are interested in attending, please check off the appropriate box on the conference registration form and add in the Industrial Control System Security (ICSS) Workshop fee. Lunch will be included as part of the workshop fee.


Proceedings

Invited Presentation: Programmable Logic Controller Forensics, Irfan Ahmed, University of New Orleans

Securing SCADA Applications Using OpenPLC With End-To-End Encryption, Thiago Alves, and Thomas Morris, The University of Alabama

Secure Data Provenance in Home Energy Monitoring Networks, Ming Hong Chia, University of Glasgow; Sye Loong Keoh, University of Glasgow; Zhaohui Tang, Singapore Institute of Technology

Invited Presentation: ICS, Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK), Otis Alexander, The MITRE Corporation

Timing Performance Profiling of Substation Control Code for IED Malware Detection, Julian L. Rrushi, Western Washington University

DoS Exploitation of Allen-Bradley's Legacy Protocol through Fuzz Testing, Francisco Tacliad; Thuy D. Nguyen, Naval Postgraduate School; Mark Gondree, Sonoma State University

Additional ACSA Events:
NSPW – New Security Paradigms Workshop
LASER – Learning from Authoritative Security Experiment Results