Annual Industrial Control System Security (ICSS) Workshop
The Industrial Control System Security Workshop will be held in Orlando, Florida, Tuesday, December 5, 2017, in conjunction with the Annual Computer Security Applications Conference (ACSAC). ACSAC will be held at the Hilton Lake Buena Vista, Orlando, Florida.
Supervisory control and data acquisition (SCADA) and industrial control systems monitor and control a wide range of industrial and infrastructure processes such as water treatment, power generation and transmission, oil and gas refining and steal manufacturing. Such systems are usually built using a variety of commodity computer and networking components, and are becoming increasingly interconnected with corporate and other Internet-visible networks. As a result, they face significant threats from internal and external actors. For example, in 2010 the Stuxnet malware was specifically written to attack SCADA systems and caused millions of dollars in damages.
The critical requirement for high availability in SCADA and industrial control systems, along with the use of resource constrained computing devices, legacy operating systems and proprietary software applications limits the applicability of traditional information security solutions. The goal of this workshop is to explore new security techniques that are applicable in the control systems context. Papers of interest including (but not limited to) the following subject categories are solicited:
- Intrusion detection and prevention
- Malware
- Vulnerability analysis and risk management
- Digital forensics
- Virtualization
- Application security
- Performance evaluation of security methods and tools in control systems
- Cybersecurity Education
Submissions
Submissions should be 5-8 pages, using the new ACM 2017 acmart templatepavailable at http://www.acm.org/sigs/publications/proceedings-templates, using the [sigconf, anonymous] options. Submissions should not use older ACM templates (e.g., sig-alternate). If you encounter any problems with the acmart template, please contact acmtexsupport@aptaracorp.com. You can also report problems with the template to https://github.com/borisveytsman/acmart/issues so that they are reviewed by SIG volunteers.
Submissions do not need to be anonymous. Submission website is at https://easychair.org/conferences/?conf=icss17. The accepted workshop papers will be published by ACM. The slides will be published on the ACSAC website.
Important Dates
Submission Deadline: | September 24, 2017 |
Acceptance Notification: | October 25, 2017 |
Final Manuscript due: | November 7, 2017 |
Workshop Date: | December 5, 2017 |
Organizing Committees
General Co-Chairs:
Harvey Rubinovitz, The MITRE Corporation
Adam Hahn, Washington State University
Program Chair
Irfan Ahmed, The University of New Orleans
Program Committee Members include:
Sajal Bhatia, Sacred Heart University
Alvaro Cardenas, University of Texas at Dallas
Ernest Foo, Queensland University of Technology, Australia
Sye Loong Keoh, University of Glasgow
Tommy Morris, University of Alabama in Huntsville
Bradley Schatz, Schatz Forensic
Vassil Roussev, University of New Orleans
Julian Rrushi, Western Washington University
Saman Zonous, Rutgers University
Publicity Chair:
Nishchal Kush, Queensland University of Technology
Workshop Registration
If you are interested in attending, please check off the appropriate box on the conference registration form and add in the Industrial Control System Security (ICSS) Workshop fee. Lunch will be included as part of the workshop fee.
Proceedings
Invited Presentation: Programmable Logic Controller Forensics, Irfan Ahmed, University of New Orleans
Securing SCADA Applications Using OpenPLC With End-To-End Encryption, Thiago Alves, and Thomas Morris, The University of Alabama
Secure Data Provenance in Home Energy Monitoring Networks, Ming Hong Chia, University of Glasgow; Sye Loong Keoh, University of Glasgow; Zhaohui Tang, Singapore Institute of Technology
Invited Presentation: ICS, Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK), Otis Alexander, The MITRE Corporation
Timing Performance Profiling of Substation Control Code for IED Malware Detection, Julian L. Rrushi, Western Washington University
DoS Exploitation of Allen-Bradley's Legacy Protocol through Fuzz Testing, Francisco Tacliad; Thuy D. Nguyen, Naval Postgraduate School; Mark Gondree, Sonoma State University