Goals

CyberICPS is the result of the merging of the CyberICS and WOS-CPS workshops that were held for the first time in conjunction with ESORICS 2015.

Cyber-physical systems (CPS) are physical and engineered systems that interact with the physical environment, whose operations are monitored, coordinated, controlled and integrated by information and communication technologies. These systems exist everywhere around us, and range in size, complexity and criticality, from embedded systems used in smart vehicles, to SCADA systems in smart grids to control systems in water distribution systems, to smart transportation systems, to plant control systems, engineering workstations, substation equipment, programmable logic controllers (PLCs), and other Industrial Control Systems (ICS). These systems also include the emerging trend of Industrial Internet of Things (IIoT) that will be the central part of the fourth industrial revolution.

As ICS and CPS proliferate, and increasingly interact with us and affect our life, their security becomes of paramount importance. CyberICPS intends to bring together researchers, engineers and governmental actors with an interest in the security of ICS and CPS in the context of their increasing exposure to cyber-space, by offering a forum for discussion on all issues related to their cyber security.

Topics

CyberICPS invites submissions that present innovative ideas, proof of concepts, use cases, and results from a variety of topics relevant to ICS and CPS, including (but not limited to) the following ones:

    Security Governance

  • Security policies
  • Risk analysis and management
  • Vulnerability assessment and metrics
  • Awareness, training and simulation
  • ICS/CPS security standards
  • Privacy and Anonymity in ICS/CPS
  • Cyber crisis management
  • System and Network Security

  • Threat modeling
  • Security architectures
  • Access control
  • Malware and cyber weapons
  • Intrusion detection and visualisation
  • Defense in depth
  • Monitoring and real time supervision
  • Applied cryptography
  • Perimeter security


  • Safety-security interactions
  • Cyber security engineering
  • Secure communication protocols
  • Formal models for ICS/CPS security
  • Hardware Security
  • Resilient ICS/CPS
  • Application Security
  • Secure Firmware
  • Incident Response and Digital Forensics for ICS/CPS

  • Forensics in ICS
  • Incident Response
  • Accountability

    Case Studies

  • Case studies in the energy, utility, chemical, transportation, manufacturing, and other industrial and critical infrastructure sectors.

General Chairs

Frederic Cuppens

Polytechnique Montréal, Canada

Sokratis Katsikas

Norwegian University of Science and Technology - NTNU, Norway



Program Committee Chairs

Nora-Boulahia Cuppens

Polytechnique Montréal, Canada

Costas Lambrinoudakis

University of Piraeus, Greece






Publicity Chair

Nikolaos Pitropakis

Edinburgh Napier University



Program Committee Members

Habtamu Abie

Norsk Regnesentral, Norway

Cristina Alcaraz

University of Malaga, Spain


Marios Anagnostopoulos

Aalborg University, Denmark

Samiha Ayed

Telecom Bretagne, France


Mauro Conti

University of Padua, Italy

David Espes

University of Brest, France


Khan Ferdous Wahid

Airbus Group, France

Joaquin Garcia-Alfaro

Telecom SudParis, France

Vasileios Gkioulos

Norwegian University of Science and Technology, Norway


Dieter Gollmann

Hamburg University of Technology, Germany

Georgios Kavallieratos

Norwegian University of Science and Technology, Norway

Stefano Longari

Politecnico di Milano, Italy


Youssef Laarouchi

EDF R&D, France

Michail Maniatakos

NYU-Abu Dhabi, UAE

Sjouke Mauw

University of Luxembourg, Luxembourg


Weizhi Meng

Technical University of Denmark, Denmark

Pankaj Pandey

Norwegian University of Science and Technology, Norway

Nikolaos Pitropakis

Edinburgh Napier University, UK


Indrakshi Ray

Colorado State University, USA

Rodrigo Roman

University of Malaga

Andrea Saracino

Consiglio Nazionale delle Ricerche, Italy


Georgios Spathoulas

University of Thessaly, Greece


Nils Ole Tippenhauer

CISPA, Germany


Stefano Zanero

Politecnico di Milano, Italy


Jianying Zhou

SUTD, Singapore


Submission Details

The conference proceedings will be published in the LNCS series. Springer have committed to publishing LNCS proceedings even in the event that conferences are cancelled, held virtually, or postponed. Submitted papers must not substantially overlap with papers that have been published or that have been simultaneously submitted to a journal or a conference with proceedings. Submissions should be at most 20 pages long, including the bibliography and well-marked appendices, and should follow the LNCS style. Submissions are to be made to the submission web site. Only pdf files will be accepted. Authors should consult Springer’s Instructions for Authors of Proceedings and use either the LaTeX or the Word templates provided on the authors’ page for the preparation of their papers. Springer’s proceedings LaTeX templates are also available in Overleaf. Springer encourages authors to include their ORCIDs in their papers. In addition, the corresponding author of each accepted paper, acting on behalf of all of the authors of that paper, must complete and sign a Consent-to-Publish form. The corresponding author signing the copyright form should match the corresponding author marked on the paper. Once the files have been sent to Springer, changes relating to the authorship of the papers cannot be made Submissions not meeting these guidelines risk rejection without consideration of their merits. Papers must be received by the submission deadline listed below (11:59 p.m. American Samoa time). Authors of accepted papers must guarantee that their papers will be presented at the workshop. If any of the authors are interested in Open Access or Open Choice, please refer to webpage for prices and additional information.

Please find the full CfP here.

For further inquiries, please contact one of the program committee chairs at:
nora.boulahia-cuppens[at]polymtl.ca or clam[at]unipi.gr
Submit Paper

Important Dates

Submission Deadline

June 16, 2023

June 30, 2023

Notification To Authors

July 18, 2023

July 25, 2023

Camera-Ready Version

August 20, 2023

Joint program of CyberICPS 2023, SECPRE 2023, DPM 2023 and CBT 2023

    28 September 2023 Room 1.6

  • (08:45 – 09:00) Welcome (Joint CyberISPS, SECPRE, DPM, CBT workshops)

    Joaquin Garcia – Alfaro, Guillermo Navarro-Arribas, Pantaleone Nespoli, Sokratis Katsikas, Christos Kalloniatis
  • • (09:10 – 10:00) Keynote Talk, Practical applications of trustworthy AI in security: detection of cyberattacks and fake news Abstract: AI solutions are widely used in a plethora of applications, including in the security domain. However, in order to be fully adopted and accepted by societies, those solutions need to fulfill the requirements of trustworthy AI. In this talk, practical examples of trustworthy AI solutions in security will be presented and discussed: cybersecurity and fake news detection. The talk will not only emphasize effective results, security and privacy but also the deployed explainability (xAI) mechanisms and software will be shown. The results of selected EU and national projects will be demonstrated (e.g. AI4Cyber, STARLIGHT, APPRAISE and SWAROG).

    Michal Choras (Bydgoszcz University of Science and Technology, Poland)
  • COFFEE BREAK 10:00 – 10:30 CET

  • SESSION 1 Chair: Prof. Sokratis Katsikas, Norwegian University of Science and Technology - NTNU 10:30-12:30 CET

  • Effects of Organizational Cyber Security Culture Across the Energy Sector Supply Chain

    Susanne Barkhald Sandberg, Aida Akbarzadeh and Vasileios Gkioulos

    • Review on privacy and trust methodologies in cloud computing

    Stavros Simou, Aikaterini-Georgia Mavroeidi and Christos Kalloniatis

    METRICS: A Methodology for Evaluating and Testing the Resilience of Industrial Control Systems to Cyberattacks

    Lennart Bader, Eric Wagner, Martin Henze and Martin Serror

    Threat analysis in Dairy Farming 4.0

    Karl Jonatan Due Vatn, Georgios Kavallieratos and Sokratis Katsikas


  • LUNCH BREAK 12:30 – 13:30 CET


  • SESSION 2 Chair: Aida Akbarzadeh 13:30 – 15:00 CET

  • • Security and Privacy for Mobile Crowdsensing: Improving Modularity and User Relevance

    Cihan Eryonucu and Panos Papadimitratos

    • Creating Privacy Policies From Data-Flow Diagrams

    Jens Leicht, Marvin Wagner and Maritta Heisel

    Overview of Social Engineering Protection and Prevention Methods

    Konstantinos Kontogeorgopoulos and Kyriakos Kritikos
  • COFFEE BREAK 15:00 – 15:30 CET


  • SESSION 3 Chair: Aida Akbarzadeh 15:30 – 18:00 CET

  • Skade – A Challenge Management System for Cyber Threat Hunting

    Teodor Sommestad, Henrik Karlzén, Hanna Kvist, and Hanna Gustafsson

    On the Usage of NLP on CVE Descriptions for Calculating Risk

    Thrasyvoulos Giannakopoulos and Konstantinos Maliatsos

    Evaluation of an OPC UA-based Access Control Enforcement Architecture

    Bjorn Leander, Aida Causevic, Hans Hansson and Tomas Lindstrom

    HoneyEVSE: An Honeypot to emulate Electric Vehicle Supply Equipments

    Massimiliano Baldo, Tommaso Bianchi, Mauro Conti, Alessio Trevisan, and Federico Turrin

    • Up-to-date Threat Modelling for Soft Privacy on Smart Cars

    Mario Raciti and Giampaolo Bella

Other Info

For further inquiries, please contact one of the program committee chairs at:

nora.boulahia-cuppens[at]polymtl.ca or clam[at]unipi.gr