ICS-CSR 2018 Registration is open!



The 5th International Symposium for ICS & SCADA Cyber Security brings together researchers with an interest in the security of industrial control systems in the light of their increasing exposure to cyber-space. The topics of interests are broad, ranging from security for hardware/firmware used in industrial control systems, to system aspects of ICS such as secure architectures and vulnerability screening to the human aspects of cyber security such as behaviour modelling and training. ICS-CSR is a research conference aimed at high quality academic research in any of the specified themes and topics of interest. We welcome original contributions that present innovative ideas, proof of concepts, use cases, and results from a variety of domains with a wish to enhance the security of infrastructure.

Proceedings of the ICS-CSR are hosted by the British Computer Society (BCS) in their eWiC series. Proceedings are indexed in the ACM Digital Library, EBSCO, DBPL and Google Scholar.

This year's conference will take place on the 29th to 30th of August 2018 at the University of Hamburg, Germany. It will be co-located with the International Conference on Availability, Reliability and Security (ARES) 2018.

As with previous editions, we will be inviting the best conference submissions to a special issue in EAI Transactions on Security and Safety. Papers will have to be significantly extended and will undergo an additional peer-review process before acceptance. The call for extended papers will be distributed at the conference.

Research Themes & Topics of Interest


ICS-CSR is welcoming contributions that have a direct application or relevance to security aspects of Distributed Control Systems (DCS), Supervisory Control and Data Acquisition Systems (SCADA), Industrial Control Systems (ICS), Cyber Physical Systems (CPS), Industrial Internet of Things (IIoT), Smart City, or Industry 4.0.

This topic list is not meant to be exhaustive; ICS-CSR is interested in all aspects of computer security relating to ICS. Papers without a clear application to SCADA, Embedded Systems or Industrial Control, however, will be considered out of scope and may be rejected without full review.

Main Conference Themes

  • Hardware Security Solutions
    • Encryption, Authentication, Availability Assurance
    • Resilient Systems
    • Application Security
    • Secure Firmware
    • Communication Systems
    • Timing Vulnerabilities in RT-Control Systems
    • Security Implications of Feature Interactions
  • System Security
    • Security Architectures
    • Safety-Security Interactions
    • Intrusion Detection
    • Security Monitoring
    • Malware Analysis
    • Cyber Security Engineering
    • Vulnerability Assessment/Screening
    • Secure Communication Protocols
    • Metrics
    • Anonymity
    • Language-based Security
    • Network Security
    • Patching and Maintenance
  • Digital Forensics and Response
    • Hardware Forensics
    • Incident Response
    • Live Forensics
    • Accountability
    • Forensic Readiness
  • Security Management
    • Risk Management
    • Security Metrics
    • Governance and Policy
    • Business Continuity
    • Critical Infrastructure Protection
  • Human Factors Security
    • Awareness and Training
    • Behavioural Modelling
    • Threat Profiling

Provisional 2018 Accepted Papers

Provisional Programme can he found here

  • CPS security assessment using automatically generated attack trees - Wouter Depamelaere, Laurens Lemaire, Jan Vossaert, Vincent Naessens
  • SAMIIT: Spiral Attack Model in IIoT Mapping Security Alerts to Attack Life Cycle Phases - Amin Hassanzadeh, Robin Burkett
  • Efficient Passive ICS Device Discovery and Identification by MAC Address Correlation - Matthias Niedermaier, Thomas Hanka, Sven Plaga, Alexander von Bodisco, Dominik Merli
  • A Two-level Intrusion Detection System for Industrial Control System Networks using P4 - Gorby Kabasele Ndonda, Ramin Sadre
  • Cyber security analysis of Web-of-Cells energy architectures - Roberta Terruggia, Giovanna Dondossola, Mathias Ekstedt
  • Identifying S7comm Protocol Data Injection Attacks in Cyber-Physical Systems - Oliver Eigner, Philipp Kreimel, Paul Tavolaton
  • PSP: A Framework to Allocate Resources to Power Storage Systems under Cyber-Physical Attacks - Yatin Wadhawan, Clifford Neuman, Anas AlMajali
  • Investigating Current PLC Security Issues Regarding Siemens S7 Communications and TIA Portal - Henry Hui, Kieran McLaughlin
  • Optimizing Blockchain for data integrity in Cyber Physical Systems - K. Koumidis, P. Kolios, and C.G. Panayiotou
  • On the Edge Realtime Intrusion Prevention System for DoS Attack - Rishabh Das, Vineetha Menon, Thomas H. Morris
  • An Open Framework for Deploying Experimental SCADA Testbed Networks - Peter Maynard, Kieran McLaughlin and Sakir Sezer
  • PLCBlockMon: Data Logging and Extraction on PLCs for Cyber Intrusion Detection - Mislav Findrik, Paul Smith, Kevin Quill and Kieran McLaughlin
  • Bro in SCADA: dynamic intrusion detection policies based on a system model - Justyna J. Chromik, Anne Remke, Boudewijn R. Haverkort

Submission and Guidelines


Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 10 pages, including tables, figures, references and appendixes and follow the EWIC formatting guidelines: http://ewic.bcs.org/category/15364. Accepted papers will be published in conference proceedings and indexed in the ACM digital library, DBLP amongst others.

All papers will be peer reviewed by members of the Programme Committee. Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. Distinguished papers, after further revisions, will be considered for publication in a special issue. The program committee will select a Best Paper Award winner for this conference. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work.

Submit your paper via EasyChair: https://www.easychair.org/conferences/?conf=icscsr2018

Instructions for Short/Positional Paper Submission:

We welcome the submission of short positional papers for short presentation or poster presentation during the conference. Positional papers must be clearly presented in English, must not exceed 4 pages, including tables, figures, references and appendixes and follow the EWIC formatting guidelines: http://ewic.bcs.org/category/15364. Accepted papers will be eligible for inclusion for presentation as a poster during the conference and selected papers will be included as an annex in the published conference proceedings.

Submit your short positional paper via EasyChair: https://www.easychair.org/conferences/?conf=icscsr2018 and use the prefix "POSITIONAL:" in the registration title.

Important Dates

Paper Submission Due: March 30, 2018 (23:59 CET) Extended Deadline: 13 April 2018
Acceptance Notification: May 29, 2018 Extended Notification: 14th June 2018
Registration: June 18, 2018
Conference: August 29-30, 2018

Keynote Speakers


Harald Niggemann, Cyber Security Strategist, German Federal Office for Information Security (BSI)


Harald Niggemann is a Cyber Security Strategist at the German Federal Office for Information Security (BSI). He joined BSI in 1999 and has worked on various theoretical and practical aspects of information security, particularly information security management, risk analysis, and standards. Harald contributed to many BSI publications and assisted government agencies in applying BSI's recommendations to real-world problems. Drawing on nearly 20 years of experience in various facets of information security, he is currently concerned with strategic aspects and basic principles of cyber security. Harald is a valued speaker at national and international conferences, where he frequently reports on new trends in the field of cyber security. Harald studied theoretical physics and holds a Dr. rer. nat. degree from the University of Cologne.
Talk: Supporting the implementation of the EU NIS directive through ICS security guidance and services
Abstract: The EU directive "concerning measures for a high common level of security of network and information systems across the Union" (EU NIS directive) is a key element of cyber security in the EU. This talk gives an overview of the German implementation of the directive from the perspective of Germany's Federal Office for Information Security (BSI) and highlights some related observations. In addition, BSI's role, publications, and supporting services in the field of ICS security are outlined.

Robert Oates, Global Software Capability Lead, Rolls-Royce PLC

Dr Robert Oates is the Global Software Capability Team Lead within Rolls-Royce. His specialism is product cyber security, with a particular focus on the security of safety-critical systems. In 2017 he lead the cyber security efforts for the world's first commercial remotely operated vessel for which he received a Rolls-Royce 'Trusted to Deliver Excellence' award. In addition to leading the cyber security efforts for a number of other projects in the defence, aerospace, and maritime sectors, he is also a winner of a 'Sir Henry Royce Award for Engineering Excellence in Improving the Way We Do Engineering' for his contributions to cryptographic frameworks for simulation of safety critical components. Dr Oates is a named author on a number of technical standards, including EUROCAE's civil aviation security standards, and The Safety Critical Systems Club's Data Safety Guidance. Dr Oates received his Masters of Engineering from The University of Reading in Applied Computer Science and Cybernetics, during which he was awarded the Anne Spencer Prize by The British Computer Society for his work as a placement student at Siemens Standard Drives. His PhD was awarded by The School of Computer Science within The University of Nottingham, and explored the use of artificial immune systems based security algorithms for autonomous mobile robots. Dr Oates has a number of publications in international journals and conferences on the topics of cyber security for autonomous and safety critical systems, and engineering methodologies for cyber security. He has been a guest speaker at a number of organisations and conferences, including The Polish Academy of Science, The Dagstuhl Seminar on Artificial Immune Systems, The Diamond Light Source, and The Scandinavian Software and System Safety Conference.
Talk: Cyber Security in the Aerospace and Maritime Transport Sectors
Abstract: The aerospace and maritime transport sectors are both facing challenges around cyber security. However, the approaches that the two sectors are taking to product cyber security risk are radically different, due in part to fundamental differences between their legislative framework and hierarchies. This talk aims to answer the following questions: What is driving cyber risk in each sector?;What does the future hold for cyber security risk management and secure product development?; What can the sectors learn from one-another?;The talk will be given from the perspective of a supplier of complex, cyber-physical systems to both sectors.

Previous keynote speakers include John S. Baras (University of Maryland), John Matherly (Shodan), Stephan Luders (CERN), Eric Byres (Tofino, Belden), Thomas Brandstetter (Limes), Sally Levesley (New Risk), and Eeiran Leverett (Cambridge University).



Conference Registration is now open!

Please follow the link to the registration page here.

Early bird Registration closes on 15th July 2018.

ICS-CSR 2018 is co-located with ARES Conference and joint ticket registrations are also available via the ARES pages



Airbus Logo

Airbus is a global leader in aerospace, defence and related services, employing around 133,000 people at more than 170 sites worldwide. Developing sustainable aircraft, connecting people, observing and understanding Earth, and making the world a safer place: Airbus does things that matter. Ever since its inception in 2000, Airbus has constantly drawn from the strength that comes from integration. The Group brings together businesses that are market leaders in their own right, forming a collective driven by a single vision. Airbus Group includes Airbus as the leading global manufacturer of the most innovative commercial and military aircraft, with Airbus Military covering tanker, transport and mission aircraft. Airbus Defence and Space, the European leader in space programmes and the third biggest space provider worldwide, is active in all space activities, from large-scale space systems to satellite services. Airbus - its people and its innovations plays a role in creating some of the world's biggest success stories, helping to make tomorrow's technology a reality.

DMU Logo

De Montfort University is a public research and teaching university situated in the city of Leicester, England, adjacent to the River Soar and the Leicester Castle Gardens. In 2008, 70% of the university's research was deemed 'world leading' (40%), or 'internationally excellent' (30%) in the United Kingdom Research Assessment Exercise. The university's pioneering research, driven by over 1,000 research students and supported by 500 staff, is internationally renowned and addresses some of the most critical issues affecting our world. Demonstrating the significance of this work, three key pieces of research are listed among the UK's top 100 projects that will have a profound impact on the future.

UHH Logo

Universität Hamburg is the largest institution for research and education in the north of Germany. As one of the country's largest universities, UHH offers a diverse course spectrum and excellent research opportunities. The University boasts numerous interdisciplinary projects in a broad range of subjects and an extensive partner network with leading institutions on a regional, national and international scale.




University of Hamburg

UHH Auditorium

ICS-CSR 2018 will be co-located with ARES 2018 at the University of Hamburg, Germany. Campus map can be found here. Room information will be added soon.

Universität Hamburg
Mittelweg 177
20148 Hamburg

Public transportation to main campus and University's main building:

  • Train (S-Bahn): The S21 and S31 trains take three minutes to get from the Main Station (Hauptbahnhof) to Dammtor Train Station (main campus).
  • Bus: The 4, 5 and 109 buses go directly to the University (Dammtor (Messe/CCH) bus stop).
  • Car: Due to limited parking, we strongly recommend taking public transportation!
  • Hotel information

    Coming soon.

    Program Committee


    General Conference Chairs

    Special Session Chairs

    • Ulrik Franke, (RISE SICS -- Swedish Institute of Computer Science): ulrik.franke@ri.se
    • Paul Smith (AIT, Austria)
    • Kieran McLaughlin (Queen's University Belfast, UK)

    Technical Programme Committee (TBC)

    • Adriano Valenzano, CNR-IEIIT, National Research Council of Italy
    • Alvaro Cárdenas, University of Texas at Dallas, USA
    • André Teixeira, TU Delft, Netherlands
    • Andrew Jones, De Montfort University, UK
    • Andrew Nicholson, WMG, Warwick University, UK
    • Antoine Lemay, Ecole Polytechnique de Montreal, Canada
    • Ayman Al Issa, Booz Allen Hamilton, Abu Dhabi
    • Babak Akhgar, Sheffield Hallam University, UK
    • Bela Genge, Petru Maior University of Tg. Mures
    • Chris Hankin, Imperial College, UK
    • Chris Johnson, University of Glasgow, UK
    • Christian Facchi, Technische Hochschule Ingolstadt, Germany
    • Cody Fleming, University of Virginia, USA
    • David Hutchison, Lancaster University, UK
    • David Laverty, Queen's University Belfast, UK
    • Edmundo Monteiro, University of Coimbra, Portugal
    • Eireann Leverett, University of Cambridge
    • Eric Byres, Byres Security
    • Erol Gelenbe, Imperial College, UK
    • Federico Maggi, Politecnico di Milano, Italy
    • Florian Skopik, AIT Austrian Institute of Technology
    • Frank Fransen, TNO, Netherlands
    • Giampaolo Bella, Universita di Catania, Italy
    • Göran N. Ericsson, SvK Swedish National Grid and KTH Royal Institute of Technology
    • Helmut Kaufmann, Airbus Group Innovations, Germany
    • Henrik Sandberg, KTH Royal Institute of Technology, Sweden
    • Howard Shrobe, Massachusetts Institute of Technology (MIT), USA
    • Jens Braband, Siemens, Germany
    • Joel Brynielsson, FOI Swedish Defence Research Agency, Sweden
    • John Baras, University of Maryland, USA
    • John O'Raw, Letterkenny Institute of Technology, Ireland
    • Jose Fernandez, Ecole Polytechnique de Montreal, Canada
    • Jens Tölle, Fraunhofer-FKIE, Germany
    • Jules Ferdinand Pagna Disso, Nettitude, UK
    • Kieran McLaughlin, Queen's University Belfast, NI
    • Laurens Lemaire, KU Leuven, Belgium
    • Luca Durante, CNR-IEIIT, Italy
    • Lucie Langer, AIT Austrian Institute of Technology, Austria
    • Leandros Maglaras, De Montfort University, UK
    • Margaret Varga, Oxford University, UK
    • Marina Krotofil, European Network for Cyber Security, Netherlands
    • Mark Carolan, Esoion Group, Ireland
    • Martin Hutle, Fraunhofer AISEC, Germany
    • Mathias Fischer, University of Münster, Germany
    • Michal Choras, University of Technology and Life Sciences (UTP), Poland
    • Michael Kasper, Fraunhofer Singapore and NTU
    • Michael Roßberg, Technische Universität Ilmenau, Germany
    • Monica Whitty, University of Leicester, UK
    • Nancy Leveson, Massachusetts Institute of Technology, USA
    • Nikolai Stoianov, Defence Institute, Bulgaria
    • Oscar Garcea-Morchon, Philips Research, Netherlands
    • Paddy Francis, Airbus Defence and Space, UK
    • Panayotis Kikiras, AGT International, Germany
    • Paul Smith, AIT Austrian Institute of Technology, Austria
    • Paulo Simões, University of Coimbra, Portugal
    • Pete Burnap, Cardiff University, UK
    • Peter Fuhr, Oak Ridge National Laboratory, USA
    • Piroska Haller, Petru Maior University of Tg. Mures, Romania
    • Rob Rowlingson, BT Security, UK
    • Robert Oates, Rolls-Royce PLC, UK
    • Rohan Chabukswar, United Technologies Research Center, Ireland
    • Roman Schlegel, ABB Corporate Research, Switzerland
    • Sebastian Obermeier, ABB Corporate Research, Switzerland
    • Silvio La Porta, EMC, Ireland
    • Stephan Reiff-Marganiec, University of Leicester, UK
    • Stephen Wolthusen, Royal Holloway, University of London, and Norwegian University of Science and Technology (NTNU), Norway
    • Thomas Brandstetter, Limes Security and St. Pölten University of Applied Sciences, Austria
    • Thomas H. (Tommy) Morris, Mississippi State University, USA
    • Tiago Cruz, University of Coimbra, Portugal
    • Tobias Gebhardt, MunichRe
    • Ulrik Franke, RISE SICS -- Swedish Institute of Computer Science
    • William Knowles, Lancaster University, UK
    • Yi Yang, State Grid Jiangsu Electric Power Company Research Institute, China


    Airbus Logo DMU Logo UHH Logo



    Submission: March 30, 2018 (23:59 CET) Extended Deadline: 13 April 2018
    Notification: May 29, 2018 Extended Notification: 14th June 2018
    Registration: June 18, 2018
    Conference: August 29-30, 2018


    Airbus Logo
    DMU Logo
    UHH Logo