ICS-CSR 2018 Registration is open!



The 5th International Symposium for ICS & SCADA Cyber Security brings together researchers with an interest in the security of industrial control systems in the light of their increasing exposure to cyber-space. The topics of interests are broad, ranging from security for hardware/firmware used in industrial control systems, to system aspects of ICS such as secure architectures and vulnerability screening to the human aspects of cyber security such as behaviour modelling and training. ICS-CSR is a research conference aimed at high quality academic research in any of the specified themes and topics of interest. We welcome original contributions that present innovative ideas, proof of concepts, use cases, and results from a variety of domains with a wish to enhance the security of infrastructure.

Proceedings of the ICS-CSR are hosted by the British Computer Society (BCS) in their eWiC series. Proceedings are indexed in the ACM Digital Library, EBSCO, DBPL and Google Scholar.

This year's conference will take place on the 29th to 30th of August 2018 at the University of Hamburg, Germany. It will be co-located with the International Conference on Availability, Reliability and Security (ARES) 2018.

As with previous editions, we will be inviting the best conference submissions to a special issue in EAI Transactions on Security and Safety. Papers will have to be significantly extended and will undergo an additional peer-review process before acceptance. The call for extended papers will be distributed at the conference.

Research Themes & Topics of Interest


ICS-CSR is welcoming contributions that have a direct application or relevance to security aspects of Distributed Control Systems (DCS), Supervisory Control and Data Acquisition Systems (SCADA), Industrial Control Systems (ICS), Cyber Physical Systems (CPS), Industrial Internet of Things (IIoT), Smart City, or Industry 4.0.

This topic list is not meant to be exhaustive; ICS-CSR is interested in all aspects of computer security relating to ICS. Papers without a clear application to SCADA, Embedded Systems or Industrial Control, however, will be considered out of scope and may be rejected without full review.

Main Conference Themes

  • Hardware Security Solutions
    • Encryption, Authentication, Availability Assurance
    • Resilient Systems
    • Application Security
    • Secure Firmware
    • Communication Systems
    • Timing Vulnerabilities in RT-Control Systems
    • Security Implications of Feature Interactions
  • System Security
    • Security Architectures
    • Safety-Security Interactions
    • Intrusion Detection
    • Security Monitoring
    • Malware Analysis
    • Cyber Security Engineering
    • Vulnerability Assessment/Screening
    • Secure Communication Protocols
    • Metrics
    • Anonymity
    • Language-based Security
    • Network Security
    • Patching and Maintenance
  • Digital Forensics and Response
    • Hardware Forensics
    • Incident Response
    • Live Forensics
    • Accountability
    • Forensic Readiness
  • Security Management
    • Risk Management
    • Security Metrics
    • Governance and Policy
    • Business Continuity
    • Critical Infrastructure Protection
  • Human Factors Security
    • Awareness and Training
    • Behavioural Modelling
    • Threat Profiling

Special Session on Cyber Security of ICS for Smart Grid

The smart grid integrates modern ICT and industrial control systems into power systems to allow monitoring and control capability with the aim of improving the efficiency, reliability and safety of the grid. The increased connectivity of such an environment provides new and widely spread entry points and a greatly increased attack surface from a cyber security perspective. An entire industry has grown around security vulnerabilities in the IT domain. With the introduction of smart grid services, something similar is likely to happen in the energy domain, with a focus on the vulnerabilities of industrial control systems that underpin these services.

Until now grid operators have lived in a relatively protected stand-alone security environment. The software and communication protocols have been different than those used on the internet and largely unknown to hackers. However, new smart grid services like demand side management and secondary substation automation, introduce new attack surfaces, new financial incentives, and in many cases use Internet protocols, thus paving the way for cyber-attacks. Attacks have the potential to lead to grid instability, blackouts, fraud, loss of customer information and physical damage of the infrastructure with significant consequences in terms of loss of revenue and loss of public confidence and trust.

The cyber security issues for the smart grid need to be clearly understood and adequately addressed to ensure the successful operation of next-generation power systems. This special session provides a platform for researchers in academia, industry and government to discuss and address the cyber security of the industrial control systems that underpin the smart grid.

  • Securing legacy industrial control systems in a modern smart grid
  • Smart grid ICS threat analysis and modelling
  • Cyber security risk management for smart grid
  • Cyber-attack resilience and tolerance analysis
  • Control strategies for the recovery of the smart grid under cyber attack
  • Smart grid security analytics and intrusion detection
  • Secure state estimation
  • Cyber security for microgrids
  • Cyber security for electrical substation automation
  • Data security technologies for smart meters

Special Session on Cyber Situational Awareness

Cyber situational awareness is receiving much attention. For example, it features prominently in national cyber and cyber security strategies being adopted all over the world. It is clear that decision-makers on the strategic level feel the need to know what is happening in "cyber space". Proper decisions require proper understanding of what is going on. In a world where ICS, SCADA and CPS are increasingly connected and exposed to the outside world, cyber situational awareness is becoming an indispensable part of operational excellence and prudent cyber security.

Situational awareness is commonly as "the perception of the elements in the environment within a volume of time and space, the comprehension of their meaning and the projection of their status in the near future" (Endsley, 1988). Cyber situational awareness is the part of situational awareness which concerns the cyber environment. This necessarily involves both technical, cognitive, and organizational challenges. Large amounts of information must be collected, processed, understood, and communicated in a timely and meaningful way to the relevant decision-makers. As a result, cyber situational awareness ought to be studied from many different perspectives, with the overall situational awareness of the situation in mind. The track on cyber situational awareness welcomes submissions on the following topics (not necessarily exhaustive):

  • Information exchange for cyber situational awareness
  • Human-computer interaction, work flows and visualization for cyber situational awareness
  • Training and exercises for cyber situational awareness
  • Bridging the gap between the operational/technical and strategic/management levels
  • Deception and cyber situational awareness
  • Empirical evaluations of technical solutions for cyber situational awareness
  • Uncertainty, strategic behavior and game theory related to cyber situational awareness
  • Data fusion for cyber situational awareness

Submission and Guidelines


Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 10 pages, including tables, figures, references and appendixes and follow the EWIC formatting guidelines: http://ewic.bcs.org/category/15364. Accepted papers will be published in conference proceedings and indexed in the ACM digital library, DBLP amongst others.

All papers will be peer reviewed by members of the Programme Committee. Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. Distinguished papers, after further revisions, will be considered for publication in a special issue. The program committee will select a Best Paper Award winner for this conference. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work.

Submit your paper via EasyChair: https://www.easychair.org/conferences/?conf=icscsr2018

Instructions for Short/Positional Paper Submission:

We welcome the submission of short positional papers for short presentation or poster presentation during the conference. Positional papers must be clearly presented in English, must not exceed 4 pages, including tables, figures, references and appendixes and follow the EWIC formatting guidelines: http://ewic.bcs.org/category/15364. Accepted papers will be eligible for inclusion for presentation as a poster during the conference and selected papers will be included as an annex in the published conference proceedings.

Submit your short positional paper via EasyChair: https://www.easychair.org/conferences/?conf=icscsr2018 and use the prefix "POSITIONAL:" in the registration title.

Important Dates

Paper Submission Due: March 30, 2018 (23:59 CET) Extended Deadline: 13 April 2018
Acceptance Notification: May 29, 2018 Extended Notification: 14th June 2018
Registration: June 18, 2018
Conference: August 29-30, 2018

Keynote Speakers


To be announced.

Previous keynote speakers include John S. Baras (University of Maryland), John Matherly (Shodan), Stephan Luders (CERN), Eric Byres (Tofino, Belden), Thomas Brandstetter (Limes), Sally Levesley (New Risk), and Eeiran Leverett (Cambridge University).



Conference Registration is now open!

Please follow the link to the registration page here.

Early bird Registration closes on 15th July 2018.

ICS-CSR 2018 is co-located with ARES Conference and joint ticket registrations are also available via the ARES pages



Airbus Logo

Airbus is a global leader in aerospace, defence and related services, employing around 133,000 people at more than 170 sites worldwide. Developing sustainable aircraft, connecting people, observing and understanding Earth, and making the world a safer place: Airbus does things that matter. Ever since its inception in 2000, Airbus has constantly drawn from the strength that comes from integration. The Group brings together businesses that are market leaders in their own right, forming a collective driven by a single vision. Airbus Group includes Airbus as the leading global manufacturer of the most innovative commercial and military aircraft, with Airbus Military covering tanker, transport and mission aircraft. Airbus Defence and Space, the European leader in space programmes and the third biggest space provider worldwide, is active in all space activities, from large-scale space systems to satellite services. Airbus - its people and its innovations plays a role in creating some of the world's biggest success stories, helping to make tomorrow's technology a reality.

DMU Logo

De Montfort University is a public research and teaching university situated in the city of Leicester, England, adjacent to the River Soar and the Leicester Castle Gardens. In 2008, 70% of the university's research was deemed 'world leading' (40%), or 'internationally excellent' (30%) in the United Kingdom Research Assessment Exercise. The university's pioneering research, driven by over 1,000 research students and supported by 500 staff, is internationally renowned and addresses some of the most critical issues affecting our world. Demonstrating the significance of this work, three key pieces of research are listed among the UK's top 100 projects that will have a profound impact on the future.

UHH Logo

Universität Hamburg is the largest institution for research and education in the north of Germany. As one of the country's largest universities, UHH offers a diverse course spectrum and excellent research opportunities. The University boasts numerous interdisciplinary projects in a broad range of subjects and an extensive partner network with leading institutions on a regional, national and international scale.




University of Hamburg

UHH Auditorium

ICS-CSR 2018 will be co-located with ARES 2018 at the University of Hamburg, Germany. Campus map can be found here. Room information will be added soon.

Universität Hamburg
Mittelweg 177
20148 Hamburg

Public transportation to main campus and University's main building:

  • Train (S-Bahn): The S21 and S31 trains take three minutes to get from the Main Station (Hauptbahnhof) to Dammtor Train Station (main campus).
  • Bus: The 4, 5 and 109 buses go directly to the University (Dammtor (Messe/CCH) bus stop).
  • Car: Due to limited parking, we strongly recommend taking public transportation!
  • Hotel information

    Coming soon.

    Program Committee


    General Conference Chairs

    Special Session Chairs

    • Ulrik Franke, (RISE SICS -- Swedish Institute of Computer Science): ulrik.franke@ri.se
    • Paul Smith (AIT, Austria)
    • Kieran McLaughlin (Queen's University Belfast, UK)

    Technical Programme Committee (TBC)

    • Adriano Valenzano, CNR-IEIIT, National Research Council of Italy
    • Alvaro Cárdenas, University of Texas at Dallas, USA
    • André Teixeira, TU Delft, Netherlands
    • Andrew Jones, De Montfort University, UK
    • Andrew Nicholson, WMG, Warwick University, UK
    • Antoine Lemay, Ecole Polytechnique de Montreal, Canada
    • Ayman Al Issa, Booz Allen Hamilton, Abu Dhabi
    • Babak Akhgar, Sheffield Hallam University, UK
    • Bela Genge, Petru Maior University of Tg. Mures
    • Chris Hankin, Imperial College, UK
    • Chris Johnson, University of Glasgow, UK
    • Christian Facchi, Technische Hochschule Ingolstadt, Germany
    • Cody Fleming, University of Virginia, USA
    • David Hutchison, Lancaster University, UK
    • David Laverty, Queen's University Belfast, UK
    • Edmundo Monteiro, University of Coimbra, Portugal
    • Eireann Leverett, University of Cambridge
    • Eric Byres, Byres Security
    • Erol Gelenbe, Imperial College, UK
    • Federico Maggi, Politecnico di Milano, Italy
    • Florian Skopik, AIT Austrian Institute of Technology
    • Frank Fransen, TNO, Netherlands
    • Giampaolo Bella, Universita di Catania, Italy
    • Göran N. Ericsson, SvK Swedish National Grid and KTH Royal Institute of Technology
    • Helmut Kaufmann, Airbus Group Innovations, Germany
    • Henrik Sandberg, KTH Royal Institute of Technology, Sweden
    • Howard Shrobe, Massachusetts Institute of Technology (MIT), USA
    • Jens Braband, Siemens, Germany
    • Joel Brynielsson, FOI Swedish Defence Research Agency, Sweden
    • John Baras, University of Maryland, USA
    • John O'Raw, Letterkenny Institute of Technology, Ireland
    • Jose Fernandez, Ecole Polytechnique de Montreal, Canada
    • Jens Tölle, Fraunhofer-FKIE, Germany
    • Jules Ferdinand Pagna Disso, Nettitude, UK
    • Kieran McLaughlin, Queen's University Belfast, NI
    • Laurens Lemaire, KU Leuven, Belgium
    • Luca Durante, CNR-IEIIT, Italy
    • Lucie Langer, AIT Austrian Institute of Technology, Austria
    • Leandros Maglaras, De Montfort University, UK
    • Margaret Varga, Oxford University, UK
    • Marina Krotofil, European Network for Cyber Security, Netherlands
    • Mark Carolan, Esoion Group, Ireland
    • Martin Hutle, Fraunhofer AISEC, Germany
    • Mathias Fischer, University of Münster, Germany
    • Michal Choras, University of Technology and Life Sciences (UTP), Poland
    • Michael Kasper, Fraunhofer Singapore and NTU
    • Michael Roßberg, Technische Universität Ilmenau, Germany
    • Monica Whitty, University of Leicester, UK
    • Nancy Leveson, Massachusetts Institute of Technology, USA
    • Nikolai Stoianov, Defence Institute, Bulgaria
    • Oscar Garcea-Morchon, Philips Research, Netherlands
    • Paddy Francis, Airbus Defence and Space, UK
    • Panayotis Kikiras, AGT International, Germany
    • Paul Smith, AIT Austrian Institute of Technology, Austria
    • Paulo Simões, University of Coimbra, Portugal
    • Pete Burnap, Cardiff University, UK
    • Peter Fuhr, Oak Ridge National Laboratory, USA
    • Piroska Haller, Petru Maior University of Tg. Mures, Romania
    • Rob Rowlingson, BT Security, UK
    • Robert Oates, Rolls-Royce PLC, UK
    • Rohan Chabukswar, United Technologies Research Center, Ireland
    • Roman Schlegel, ABB Corporate Research, Switzerland
    • Sebastian Obermeier, ABB Corporate Research, Switzerland
    • Silvio La Porta, EMC, Ireland
    • Stephan Reiff-Marganiec, University of Leicester, UK
    • Stephen Wolthusen, Royal Holloway, University of London, and Norwegian University of Science and Technology (NTNU), Norway
    • Thomas Brandstetter, Limes Security and St. Pölten University of Applied Sciences, Austria
    • Thomas H. (Tommy) Morris, Mississippi State University, USA
    • Tiago Cruz, University of Coimbra, Portugal
    • Tobias Gebhardt, MunichRe
    • Ulrik Franke, RISE SICS -- Swedish Institute of Computer Science
    • William Knowles, Lancaster University, UK
    • Yi Yang, State Grid Jiangsu Electric Power Company Research Institute, China


    Airbus Logo DMU Logo UHH Logo



    Submission: March 30, 2018 (23:59 CET) Extended Deadline: 13 April 2018
    Notification: May 29, 2018 Extended Notification: 14th June 2018
    Registration: June 18, 2018
    Conference: August 29-30, 2018


    Airbus Logo
    DMU Logo
    UHH Logo