Program
9:00am - 9:10am Welcome
9:10am - 10:30am Morning Session I
-
Targeting the Blind Spot: Evaluating Modern ICS Security Against A Novel Denial of Service (DoS) Attack Gargi Mitra, Pritam Dash, Yingao (Elaine) Yao, Aastha Mehta, Karthik Pattabiraman (University of British Columbia, Vancouver)
-
“There are rabbit holes I want to go down that I’m not allowed to go down”: An Investigation of Security Expert Threat Modeling Practices for Medical Devices Ronald E. Thompson, Madeline McLaughlin, Carson Powers, Daniel Votipka (Tufts University)
-
[Best Paper Award] On Practical Realization of Evasion Attacks for Industrial Control Systems Alessandro Erba (Karlsruhe Institute of Technology (KIT)); Andres Murillo (Fujitsu); Riccardo Taormina (TU Delft); Stefano Galelli (Cornell); Nils Ole Tippenhauer (CISPA Helmholtz Center for Information Security)
-
Risk-Based Methodology for Optimal Cryptoperiod Calculation in ICSs Under Data Siphoning Attack Natalija Vlajic, Gabriele Cianfarani (York University); Robert Noce (Cloud Architecture, Innovation, & Research SAP)
10:30am - 11:00am Coffee Break
11:00am - 12: 00pm Morning Session II
-
Optimizing Proof of Aliveness in Cyber-Physical Systems Zheng Yang (Southwest University); Chenglu Jin (Centrum Wiskunde & Informatica); Xuelian Cao (Southwest University); Marten van Dijk (Centrum Wiskunde & Informatica); Jianying Zhou (Singapore University of Technology and Design)
-
Unveiling Neural Network Data Free Backdoor Threats in Industrial Control Systems Zijian Zhang, Isra Elsharef, Zhen Zeng (University of Wisconsin-Milwaukee)
-
On the Feasibility of Detecting Model Poisoning Attacks in Real-time ML-based ICS Van Phan (University of Central Florida); Ruimin Sun, Mohammed Al Duniawi (Florida International University); Ruixue Lian (University of Wisconsin-Madison); Harshin Kamal Asok, Arturo Leon (Florida International University)
12:00pm - 13:30pm Lunch
13:30am - 15: 00pm Afternoon Session I
-
[Best Paper Award] Score and You Shall Find: A Novel Regularization Technique for Cyberattack Detection in Industrial Control Systems Tatsumi Oba (Panasonic Holdings Corporation); Tadahiro Taniguchi (Kyoto University); Naoto Yanai (Panasonic Holdings Corporation)
-
Context-Aware Intrusion Detection in Industrial Control Systems Md Raihan Ahmed, Mu Zhang (University of Utah)
-
Comparing the Security Approaches of CIP and OPC UA Alexander Gebhard, Debbie Perouli (Marquette University)
-
[Best Presentation Award] By the Numbers: Towards Standard Evaluation Metrics for Programmable Logic Controllers’ Defenses Efrén López-Morales, Jacob Hopkins (Texas A&M University-Corpus Christi); Alvaro A. Cardenas (University of California, Santa Cruz); Ali Abbasi (CISPA Helmholtz Center for Information Security); Carlos Rubio-Medrano (Texas A&M University-Corpus Christi)
15:00am - 15:30am Coffee Break
15:30am - 16: 30pm Afternoon Session II
-
Lightweight and Decentralized Access Control for Cloud-Assisted Industrial Control Systems Kasturi Routray, Padmalochan Bera (IIT Bhubaneswar)
-
Towards Cross-Physical-Domain Threat Inference for Industrial Control System Defense Adaptation Jainta Paul, Lawrence Ponce, Mu Zhang, Luis Garcia (University of Utah)
-
[Best Presentation Award] Comparison of Industrial Control System Anomaly Detection Methods Piotr Sobonski (Collins Aerospace Applied Research and Technology); Utz Roedig (University College Cork)