New: Special Issue in Journal of Information Security and Applications

Programme Available



The 3rd International Symposium for ICS & SCADA Cyber Security brings together researchers with an interest in the security of industrial control systems in the light of their increasing exposure to cyber-space. The topics of interests are broad, ranging from security for hardware/firmware used in industrial control systems, to system aspects of ICS such as secure architectures and vulnerability screening to the human aspects of cyber security such as behaviour modelling and training. ICS-CSR is a research conference aimed at high quality academic research in any of the specified themes and topics of interest. We welcome original contributions that present innovative ideas, proof of concepts, use cases, and results from a variety of domains with a wish to enhance the security of infrastructure.

Proceedings of the ICS-CSR are hosted by the British Computer Society (BCS) in their eWiC series. Proceedings are indexed in the ACM Digital Library, EBSCO and Google Scholar. We are investigating indexing in Scopus and DBPL.

This year's conference will take place on the 17th and 18th of September 2015 at the University of Applied Sciences Ingolstadt (Germany)

We will be inviting the best conference submissions to a special issue on Cyber Security of Industrial Control Systems in the Journal of Information Security and Applications (Elsevier). Papers will have to be significantly extended and will undergo an additional peer-review process before acceptance. The call for extended papers will be distributed at the conference.

Click to download the Conference Programme (PDF)


Research Themes & Topics of Interest


ICS-CSR is welcoming contributions that have a direct application or relevance to Security aspects of Supervisory Control and Data Acquisition Systems (SCADA), Industrial Control Systems (ICS), or Cyber Physical Systems (CPS).

  • SCADA, ICS and CPS Hardware Security Solutions
    • Encryption, Authentication, Availability Assurance
    • Resilient Systems
    • Application Security
    • Secure Firmware
    • Timing Vulnerabilities in RT-Control Systems
    • Security Implications of Feature Interactions
  • SCADA, ICS and CPS System Security
    • Security Architectures
    • Safety-Security Interactions
    • Intrusion Detection
    • Malware Analysis
    • Cyber Security Engineering
    • Vulnerability Assessment/Screening
    • Secure Communication Protocols
    • Metrics
    • Anonymity
    • Language-based Security
    • Network Security
  • SCADA, ICS and CPS Forensics
    • Hardware Forensics
    • Incidence Response
    • Live Forensics
    • Accountability
  • Human Factors Security
    • Awareness and Training
    • Behavioural Modelling
    • Threat Profiling

This topic list is not meant to be exhaustive; ICS-CSR is interested in all aspects of computer security relating to ICS. Papers without a clear application to SCADA, Embedded Systems or Industrial Control, however, will be considered out of scope and may be rejected without full review.

Submission and Guidelines


Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 10 pages, including tables, figures, references and appendixes and follow the EWIC formatting guidelines: Accepted papers will be published in conference proceedings and indexed in the ACM digital library.

All papers will be peer reviewed by members of the Programme Committee. Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. Distinguished papers, after further revisions, will be considered for publication in a special issue. The program committee will select a Best Paper Award winner for this conference. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work.

Submit your paper via EasyChair:

Instructions for Short Positional Paper Submission:

We welcome the submission of short positional papers for poster presentation during the conference. Positional papers must be clearly presented in English, must not exceed 4 pages, including tables, figures, references and appendixes and follow the EWIC formatting guidelines: Accepted papers will be eligible for inclusion for presentation as a poster during the conference and selected papers will be included as an annex in the published conference proceedings. Submit your short positional paper via EasyChair: and use the prefix “POSITIONAL:” in the registration title.

Important Dates

Paper Submission Due: 15th May 2015 (extended to Thursday 28th May 2015 (23:59 CET))
Acceptance Notification: 23 June 2015
Revised Papers Due: 10 July 2015
Early Bird Registration: by 24 July 2015
Registration: by 27 August 2015
Late Registration: after 27 August 2015
Conference: 17-18 September 2015

Keynote Speakers


John S. Baras (University of Maryland)

John holds a joint appointment as professor in the Department of Electrical and Computer Engineering and the Institute for Systems Research. He was the founding director of ISR, which is one of the first six National Science Foundation engineering research centers. Dr. Baras is the Lockheed Martin Chair in Systems Engineering and is the founding and current director of the Center for Hybrid and Satellite Communication Networks, a NASA commercial space center. He also serves as a faculty member of the university's Interdisciplinary Program in Applied Mathematics and an affiliate professor in the Computer Science

Title: Security and Trust for Networked Control and Sensor Systems
Abstract: The tremendous explosion of wireless devices and services have created unprecedented advances and are impacting every aspect of life and work. However, many of these advances and resulting expanding markets are critically endangered by weaknesses in security, integrity and trust. We first describe several of these emerging systems and markets including aerospace, automotive, industrial control, factories, power grids and SCADA, healthcare, e-commerce, e-payments, social networks over the Web. We then describe various physical layer (e.g. hardware and signal processing) techniques that can be successfully utilized to significantly strengthen the security of wireless devices and networked systems. We argue for the need of a “trusted core” in wireless networks and for the allocation of part of the security functionality to the physical layer. We next turn into the subject of trust in networked systems and describe a new framework using multiple partially ordered semirings for analyzing reputation and trust dynamics and composite trust. Next we describe our work based on constrained coalitional games towards understanding the role of trust in collaboration and social networks. We describe several specific applications of these methods in securing distributed inference systems, SCADA sensor networks for power grids, wireless network routing protocols, LTE paging systems, wireless handheld devices for healthcare and e-payment systems. We close by describing the need for rigorous frameworks and theories for composable security and outline future research challenges and directions.

John Matherly (SHODAN)

John Matherly is an Internet cartographer, speaker and founder of Shodan, the world’s first search engine for the Internet-connected devices. Born and raised in Switzerland, he attended the Freies Gymnasium in Zurich where he majored in business and law until he moved to the San Diego, USA at the age of 17. There he worked at the San Diego Supercomputer Center to help manage the world’s foremost protein data bank. At the same time, he was also attending the University of California San Diego’s bioinformatics program which would kindle the fascination with large data and efficient algorithms. His final project included analyzing the human genome for exon code regions and mapping them to proteins while accounting for alternative splicing. After graduating, he worked as a freelance software engineer at a variety of companies including bioinformatics work.

Title: ICS for Everybody
Abstract: The ability to find, classify and interact with industrial control systems has grown significantly over the past few years and public awareness of its issues has increased alongside it. Proprietary protocols have open-source implementations, security conferences let you play with PLCs and honeypots have become increasingly popular for measuring attacks on the Internet. This talk goes through the history of discovering publicly accessible ICS with Shodan, how the landscape has changed since it started and what issues we can expect to see in the future based on the experience of running an ICS search engine.



Conference Registration is now open. Please follow the link to the registration page Early bird Registration closes on 24th July 2014.

Convenient hotels close to the location would be the Hotel Rappensberger, the Altstadthotel or the Hotel zum Anker. Please see here HOTEL DE for details on location and pricing as well as other alternatives.

Click to download the Conference Programme (PDF)


Airbus Group Logo

The Airbus Group is a global leader in aerospace, defence and related services, employing around 133,000 people at more than 170 sites worldwide. Developing sustainable aircraft, connecting people, observing and understanding Earth, and making the world a safer place: Airbus does things that matter. Ever since its inception in 2000, Airbus has constantly drawn from the strength that comes from integration. The Group brings together businesses that are market leaders in their own right, forming a collective driven by a single vision. Airbus Group includes Airbus as the leading global manufacturer of the most innovative commercial and military aircraft, with Airbus Military covering tanker, transport and mission aircraft. Airbus Defence and Space, the European leader in space programmes and the third biggest space provider worldwide, is active in all space activities, from large-scale space systems to satellite services. Airbus — its people and its innovations — plays a role in creating some of the world’s biggest success stories, helping to make tomorrow’s technology a reality.

DMU Logo

De Montfort University is a public research and teaching university situated in the city of Leicester, England, adjacent to the River Soar and the Leicester Castle Gardens. In 2008, 70% of the university's research was deemed 'world leading' (40%), or 'internationally excellent' (30%) in the United Kingdom Research Assessment Exercise. The university’s pioneering research, driven by over 1,000 research students and supported by 500 staff, is internationally renowned and addresses some of the most critical issues affecting our world. Demonstrating the significance of this work, three key pieces of research are listed among the UK’s top 100 projects that will have a profound impact on the future.

DMU Logo

The Technische Hochschule Ingolstadt is a dynamic and highly committed university of applied sciences. Since its foundation in 1994, the THI offers a wide range of programs that prepare students to use scientific methods in their professional career. Excellent learning and working conditions create the necessary framework for a short period of study and a high level of success. Research at the Technische Hochschule Ingolstadt builds on a centuries-old tradition at Ingolstadt as a centre of academic research in the state of Bavaria. We devote particular attention to the training and education of junior researchers: research work that systematically seeks to find solutions to specific problems is beneficial to the development and welfare of the region. The research focus is set on mobility technologies, which mainly consists of the automotive and aviation sector, supported by companies which are located in the region. In this area a lot of research projects based on industrial control systems exist. To concentrate these activities the Production Now initiative at THI has been started.




University of Applied Sciences Ingolstadt

THI is a dynamic and highly committed university of applied sciences. Since its foundation in 1994, Ingolstadt University of Applied Sciences offers a wide range of programmes that prepare students to use scientific methods in their professional career. Excellent learning and working conditions create the necessary framework for a short duration of study and a high level of success. The impressive campus is defined by its glass architecture, large green spaces and the functionality of the buildings. The expansion of the campus into the neighbouring area, finished in 2015, provides more space for our increasing number of students including two buildings for lecture and seminar rooms, laboratories and offices. Student life takes place in a new, architecturally interesting and well lit campus, offering everything a student could possibly hope to find. Glass and steel predominate and the appearance of the building’s smooth surface changes according to the weather. Everything is light and creates an ideal atmosphere for learning. An airy refectory enables students to work in the open. Generous lounge areas, a canteen, a cafeteria, a courtyard and a number of balconies create the appropriate atmosphere and surroundings for simply “chilling out”.

Program Committee


Conference Chairs

Organising Chair and Committee

  • Christian Facchi, University of Applied Sciences Ingolstadt, Germany
  • Monika Blaschke, University of Applied Sciences Ingolstadt, Germany

Technical Programme Committee (tbc)

  • Adriano Valenzano, CNR-IEIIT, National Research Council of Italy
  • Alvaro Cárdenas, University of Texas at Dallas, USA
  • Andrew Nicholson, De Montfort University UK
  • Bela Genge, Petru Maior University of Tg. Mures
  • Chris Hankin, Imperial College UK
  • Chris Johnson, University of Glasgow UK
  • David Hutchison, Lancaster University UK
  • Dieter Gollmann, Technische Universität Hamburg-Harburg Germany
  • Edmundo Monteiro, University of Coimbra Portugal
  • Eric Byres, Byres Security
  • Florian Skopik, AIT Austrian Institute of Technology
  • Helmut Kaufmann, Airbus Group Innovations Germany
  • Jens Braband, Siemens
  • Jules Ferdinand Pagna Disso, Nettitude UK
  • Kieran McLaughlin, Queen's University Belfast NI
  • Luca Durante, CNR-IEIIT Italy
  • Leandros Maglaras, De Montfort University, UK
  • Marina Krotofil, European Network for Cyber Security, Netherlands
  • Mark Carolan, Deep-Secure, UK
  • Mathias Fischer, International Computer Science Institute, Berkeley, USA
  • Michael Roßberg, Technische Universität Ilmenau Germany
  • Oscar Garcea-Morchon, Philips Research Netherlands
  • Panayotis Kikiras, AGT International, Germany
  • Paul Smith, AIT Austrian Institute of Technology GmbH Austria
  • Paulo Simões, University of Coimbra Portugal
  • Phillip L. Nico, California Polytechnic State University USA
  • Piroska Haller, Petru Maior University of Tg. Mures, Romania
  • Rob Rowlingson, BT Security UK
  • Robert Oates, Rolls-Royce PLC UK
  • Roman Schlegel, ABB Corporate Research, Switzerland
  • Sally Leivesely, Newrisk UK
  • Sandro Etalle - Technical University of Eindhoven & University of Twente - Netherlands
  • Sebastian Obermeier, ABB Corporate Research, Switzerland
  • Stephan Reiff-Marganiec, University of Leicester UK
  • Thomas Brandstetter, Limes Security and FH St Poelten, Austria
  • Thomas H. (Tommy) Morris, Mississippi State University USA
  • Tiago Cruz, University of Coimbra, Portugal
  • Ulrik Franke, FOI – Swedish Defence Research Agency
  • Vladimir Vylkov, Siemens DF, Industrial Security Services USA
  • William Knowles, Lancaster University UK
  • Yan Zhang, Simula Research Laboratory, Norway





Submission: 28th May 2015
Notification: 23rd June 2015
Revisions: 10th July 2015
Early Bird: by 24th July 2015
Standard: by 27th August 2015
Late: after 27th August 2015
Conference: 17-18 September 2015

DMU Logo
THI Logo