Final Program

Conferece program as PDF.

Papers presented a the conference will be made available through LNCS. As a service to the attendants at CRITIS, pre-proceedings versions of these papers are available (protected with a password provided at the registration desk) here.

Keynote speakers

Ainara Casajus Valles

Prof. David M. Nicol

Prof. Awais Rashid

Yves Rougier

Dr. Marianthi Theocharidou

Sessions are held in room Ada Lovelace and coffee breaks in room Ljusgården, see this page for directions.

Monday September 23

For transport to and from the conference venue, see the bus information.

08.00-09.00 Registration
09.00-09.15 Welcome (conference Chair: Simin Nadjm-Tehrani)
09.15-10.15 Keynote Prof. Awais Rachid (session chair: Simin Nadjm-Tehrani)
Everything is Awesome! Or is it? Cyber Security Risks in Critical Infrastructure, slides
10.15-10.45Coffee break
10.45-12.15Technical session: Risk management (session chair: Mikael Asplund)
  • Exploring how Component Factors and their Uncertainty Affect Judgements of Risk in Cyber-Security (Zack Ellerby, Josie McCulloch, Melanie Wilson and Christian Wagner), slides
  • Estimating Cascading Effects in Cyber-Physical Critical Infrastructures (Stefan Schauer, Thomas Grafenauer, Sandra König, Manuel Warum and Stefan Rass)
  • Aggregating Centrality Rankings: A Novel Approach to Detect Critical Infrastructure Vulnerabilities (Gabriele Oliva, Annunziata Esposito Amideo, Stefano Starita, Roberto Setola and Maria Paola Scaparra)
12.15-13.45Lunch at Mjellerumsgården
13.45-14.45Keynote: Dr. Marianthi Theocharidou (session chair: Roberto Setola)
NIS Directive and the role of ENISA
14.45-15.15Short papers (session chair: Roberto Setola)
  • On the Importance of Agility, Transparency, and Positive Reinforcement in Cyber Incident Crisis Communication (Tomomi Aoyama, Atsushi Sato, Giuseppe Lisi and Kenji Watanabe)
  • SealedGRID: A Secure Interconnection Technologies for Smart Grid Applications (Aristeidis Farao, Juan Enrique Rubio, Cristina Alcaraz, Christoforos Ntantogian, Christos Xenakis and Javier Lopez)
15.15-15.45Coffee break
15.45-17.45Industrial & Practical experience reports (session chair: Francesco Flammini)
  • SAFeRA 4STER: Integrated Management of Safety and Security Synergies in Seveso Plants (Gabriele Oliva, Roberto Setola and Giacomo Assenza)
  • Using serious gaming to train operators of critical infrastructure (Tommy Gustafsson and Lars Westerdahl)
  • Industry/Experience report on recent Trends in Cyber Economy and the Impact on OT (Eleni Richter), slides
  • Experience Report from an Intrusion Attempt on the Power Distribution Grid (Anders Hansson)
17.45Buss transport to Vricon
18.15-20.00Reception at Vricon

Note: you need to have a valid ID when you arrive at Vricon!

Tuesday September 24

9:00-10:00Keynote: Prof. David Nicol (session chair: Göran Ericsson)
Challenges in Quantifying An Adversary's Cyber Access to Critical Infrastructures, slides
10:00-10:30Coffee Break
10:30-11:30Technical session: Vulnerability assessment (session chair: Anne Remke)
  • Automatic Vulnerability Analysis for Cyber-Physical System (Yuning Jiang, Yacine Atif and Jianguo Ding)
  • Climate Change Impact and Vulnerability Analysis in the City of Bratislava: Application and Lessons Learned (Daniel Lückerath, Eva Streberová, Manfred Bogen, Erich Rome, Oliver Ullrich and Eva Pauditsová)
11:30-12:00Short papers (session chair: Anne Remke)
  • A Dynamic Risk Assessment (DRA) Methodology for High Impact Low Probability (HILP) Security Risks (Carlo Dambra, Chanan Graf, Jordi Arias and Alex Gralewski)
  • On Actuator Security Indices (Jezdimir Milosevic, Sebin Gracy and Henrik Sandberg)
12:00-13:30Lunch at Universitetsklubben
13:30-15:00Technical session: Resilience and Mitigation (session chair: Gregorio D'Agostino)
  • Intrusion Resilience for PV Inverters in a Distribution Grid Use-Case Featuring Dynamic Voltage Control (Boojoong Kang, David Umsonst, Mario Faschang, Christian Seitl, Ivo Friedberg, Friederich Kupzog, Henrik Sandberg and Kieran McLaughlin)
  • Mitigating escalation of cascading effects of a payment disruption across other critical infrastructures: lessons learned in 15 simulation-games (Joeri Van Laere, Björn J. E. Johansson, Leif Olsson and Peter Määttä)
  • Using Datasets from Industrial Control Systems for Cyber Security Research and Education (Qin Lin, Sicco Verwer, Robert Kooij and Aditya Mathur)
15:00-15:30Coffee break
15.30-16.00Keynote: Ainara Casajus Valles (session chair: Simin Nadjm-Tehrani)
National Risk Assessments and EU/JRC guidelines, slides
16:00-17:00Special session on cyber ranges and testbeds (session chair: Simin Nadjm-Tehrani)
  • Short paper: A Virtual Cyber-Security Testbed for Continuously Controlled Systems (Viktor Tuul and Henrik Sandberg)
  • Roundtable discussion: Prof. Anne Remke (univ. Twente/Münster Univ.), Dr. Olaf Manuel Maennel (Center for Digital Forensics and Cyber Security at Tallinn University of Technology, Estonia), Dr. Shahid Raza (RISE), Tommy Gustavsson (FOI, Sweden)
19:00-23:00Conference banquet and tour of Swedish Air Force Museum

Wednesday September 25

9:00-10:00Keynote: Mr. Yves Rougier (session chair: Robert Ernst Kooij)
Hybrid Threats Impact on Crisis Management
10:00-10:30Technical session: Transport (session chair: Bernhard Hämmerli)
  • Securing Software Updates for Trains (Tatiana Galibus)
10:30-11:00Coffee break
11:00-11:30Technical session: Finance (session chair: Bernhard Hämmerli)
  • A comparison between SWIFT and Blockchain from a cyber resiliency perspective - Addressing the payments infrastructure vulnerabilities to evolving cyber threats (Luisa Franchina and Guido Carlomagno)
11:30-11:45Young CRITIS Award (chair: Marco Santarelli, Scientific director ReS On Network)
11:45-12:00Next CRITIS!
12:00-13:30Lunch at Universitetsklubben
13:30-15:00Breakout sessions

Keynote speaker presentations

Ainara Casajus Valles,
Project Officer, Directorate for Space, Security and Migration - JRC.E.1,
Disaster Risk Management Unit, European Commission

How science can help in the preparation of National Risk Assessments

The Union Civil Protection Mechanism (Decision No 1313/2013/EU) calls Participant States to develop risk assessments periodically and make the summary of those available to the European Commission, with the aim of promoting an effective and coherent approach to prevention of and preparedness for disasters. The different summaries reported have revealed how challenging it can be for Member States to develop National Risk Assessments (NRAs) due to the diversity of disaster risk management governances in place around Europe, the different level of information available about risk and the their past experiences in carrying out that exercise.

The Report "Recommendations for National Risk Assessment for Disaster Risk Management in the EU" (version 0) attempts to answer the questions of "why" and "how" to do a risk assessment, paying special attention to how science can help in that exercise. The Report is the results of a collaborative effort of the Disaster Risk Management Knowledge Centre team (DRMKC) and nine expert groups from the Joint Research Centre (JRC) to cover various hazards and assets.

This first version of the Report proved that science can already provide advice for risk in a single-hazard framework, in most of the cases. As one of the objectives of NRA is to find a common ground of understanding of the risk faced and their relative priority, the first step towards a multi-hazard assessment is actually harmonising and standardising the assessment as well as the risk metrics among different hazards. At the same time, better knowledge base of risk, availability of data and the development of risk analysis methodologies would facilitate the disaster risk managers to recognise the risk drivers that lead to risk and more effectively plan which capacities are needed.

Version 1 of the mentioned Report is underdevelopment, trying to include other risk such as forest fires and cyber security risk.

Prof. David M. Nicol,
Director, Information Trust Institute Franklin W. Woeltge Professor of
Electrical and Computer Engineering
University of Illinois at Urbana-Champaign

Challenges in Quantifying An Adversary's Cyber Access to Critical Infrastructures

Critical infrastructures such as the power grid, up and down stream components of oil and gas production, communication network, transportation networks and so on are now all controlled by devices with CPUs and memory that communicate over both wireline and wireless channels. Quantitative assessment of risk to the controlled infrastructure depends both on models and analysis of the infrastructure under attack, and of the adversary's ability to mount those attacks. To quantitatively assess the risk to the critical infrastructure of cyber-mischief we have to be able to quantitatively assess that component of the risk which depends on the adversary's cyber access to devices which measure and manipulate the physical system. There are myriad challenges in this subproblem, which derive from the adversary's learning by moving laterally through the network, on the state of knowledge and lack of knowledge about means by which the adversary can make those movements, on quantifying the difficulty of exploiting vulnerabilities as that lateral movement is made. This talk highlights the challenges as we see them after working on this and related problems for several years.

Prof. Awais Rashid,
Professor of Cyber Security,
University of Bristol

Everything is Awesome! Or is it? Cyber Security Risks in Critical Infrastructure

Industrial Control Systems play an important role in the monitoring, control, and automation of critical infrastructure such as water, gas, oil, and electricity. Recent years have seen a number of high profile cyber attacks on such infrastructure exemplified by Stuxnet and the Ukrainian Power Grid attacks. This naturally begs the question: how should we manage cyber security risks in such infrastructure on which the day-to-day functioning of our society relies? What are the complexities of managing security in a landscape shaped by the often competing demands of a variety of stakeholders, e.g., managers, control engineers, enterprise IT personnel and field site operators? What are the challenges posed by the convergence of IoT and critical infrastructure through the so-called Industrial Internet of Things? And will frameworks such as the EU NIS directive help mitigate the cyber security risks to critical infrastructure? This talk will discuss insights from a multi-year programme of research investigating these issues and the challenges to addressing them.

Yves Rougier
Head of planning and crisis management at the ministry for the ecological and inclusive transition, France

Hybrid Threats Impact on Crisis Management

Historically the terrorist threats were mainly constituted of physical actions. They took different forms which evolved during the twentieth century in a continuous way with increasing consequences and effects. The eleventh September 2001 attacks were a real strategic surprise but only involving "classical" operational means. Then the cyber threats were considered and they introduced a new dimension of complexity and capacities for the terrorists. Since 2001 everything can be considered as possible, with the cyber threats this means that attacks can be controlled from far away and the systemic dimension of cyber also changes the nature of the threats from a physically limited act to a systemic act which can reach simultaneously every point connected with the system. Recently, a new dimension appeared linked to the social networks and to the flow of news which are not checked before being published by medias, both of them opening the door to the proliferation of fake news. This new dimension has already been used in France by the "Yellow Jackets" in order to win the battle for public opinion. The hybrid threat is in fact nothing more than a cocktail of physical event potentially combined with a cyber-attack and a fake news flow on social networks based on a deformed reality. If the previous situations were handled by security and cyber-security specialists using professional tools, this new type of threat requires a global involvement of the whole company and even of its partners and customers. This means that new skills and a globalizing approach must be developed based on human sciences more than on tools. This is the condition to be able to set up the barriers to prevent, deter, identify, delay, react and recover to and from these new kind of actions.

Dr. Marianthi Theocharidou,
Network and Information Security officer, at ENISA, the EU Agency for Cybersecurity

NIS Directive and the role of ENISA

Marianthi Theocharidou works at ENISA, the EU agency for Cybersecurity. Until recently she had been employed in the European Commission’s Joint Research Centre. She has experience in critical infrastructure protection and resilience, risk management and dependency modelling. Marianthi will provide an update on the progress of the implementation of the NIS directive. She will explain the role of ENISA to assist Member States in the consistent implementation the NIS Directive (NISD) and to support public and private stakeholders to enhance the security and resilience of their smart infrastructures and services. She will also discuss the new breach reporting under the NIS Directive and discuss some of the opportunities and challenges here.