• Workshops
  • Accepted Papers
  • Attending ARES & DOD
  • Social Events
  • Presenter Information
  • Venue and Location
  • Co-located Conferences
  • ICS-CSR 2024
  • Archive
  • Registration & Visa
  • EPESec

    5th International Workshop on Electrical Power and Energy Systems Safety, Security and Resilience
    • Date
      Jul 30, 2024
    • Location
      SR03
    • Duration
      10:30 — 14:30
    Workshops Lettering

    Workshop Chairs

    Workshop Chairs Logo Workshop Chairs Logo Workshop Chairs Logo Workshop Chairs Logo
    • → Vasileios Gkioulos
    • → Theodoros Rokkas
    • → Swarna Kumarswamy-Das
    • → Elvira Sánchez Ortiz

    Accepted Paper

    Vulnerability management digital twin for energy systems
    Jessica B. Heluany (Norwegian University of Science and Technology, Norway), Johannes Goetzfried (Siemens Energy AG - Industrial Cybersecurity, Germany), Bernhard Mehlig (Siemens Energy AG - Industrial Cybersecurity, Germany), Vasileios Gkioulos (Norwegian University of Science and Technology, Norway)
    Full Paper
    Increasing cyber attacks underscore the importance of addressing system vulnerabilities to reduce security risks. To structure our workflow of vulnerability management, we made use of relevant and widely adopted industrial standards, while also incorporating the concept of digital twins. Therefore, this research suggests a vulnerability management digital twin that aligns with the ISO 23247-2 framework. It specifically emphasizes recommendations for the ‘data collection’ function following the workflow outlined in IEC 62443-2-3, and exemplifying use cases based on a typical automation architecture of energy systems. We evaluated the CVSS framework to prioritize scores and also examined ways to integrate CVSS with other contextual information to develop a mitigation deployment strategy. The goal was to assist asset owners in optimizing resource utilization in addressing vulnerabilities.
    Workshop EPESec
    Anomaly detection mechanisms for in-vehicle and V2X systems
    Alexios Lekidis (University of Thessaly, Greece)
    Full Paper
    Modern V2X systems have an increasing number of interfaces that allow remote connectivity, but also include the risk of exposure to cyber threats. The attack surface for such threats is hence constantly increasing and in combination with privacy issues that may arise through the presence of sensitive data from users in the V2X ecosystem, this necessitates the requirement for security mechanisms. However, the existing mechanisms to ensure protection against such threats face major hurdles, such as 1) the lack of in-vehicle addressing schemes, 2) the abundance of V2X interfaces and 3) the manufacturer-specific architecture of each vehicle consisting of a variety of different systems. On top of these hurdles, a solution should satisfy the real-time requirements of the resource-constrained in-vehicle architecture by remaining lightweight and highly reliable as well as by avoiding false positive indications and alarms. This article presents a novel anomaly detection solution for addressing the main challenges of security mechanisms by simultaneously keeping a minimal impact on the real-time in-vehicle requirements. The solution is demonstrated through an Electric Vehicle (EV) charging hub testbed that implements anomaly detection schemes to detect proof-of-concept cyber-attacks targeting EV charging profile and causing cascading effects by zeroing the vehicle speed.
    Workshop EPESec
    The Cyber Safe Position: An STPA for Safety, Security, and Resilience Co-Engineering Approach
    Georgios Gkoktsis (Fraunhofer SIT | ATHENE, Germany), Ludger Peters (Fraunhofer SIT | ATHENE, Germany)
    Full Paper
    Model Based Security Engineering (MBSE) is a growing field of research, which is gaining popularity in the domain of Safety, Security, and Resilience Co-Engineering. The System Theoretic Process Analysis (STPA) is a method for systematically analyzing the behavior of complex systems to investigate their failure modes and the Unsafe Control Actions (UCA) that can lead to those failure modes. This paper expands the methodological scope of STPA, by including an iterative Root-Cause Analysis element, which examines the possible emergence of UCAs due to either malfunction, or malicious action. Output of the method are the attributes and constraints of Resilience Modes of system configuration and operation, named ''Cyber Safe Position`` (CSP). The proposed method is applied in the case study of a Photovoltaic Plant connected to a Virtual Power Plant (VPP).
    Workshop EPESec
    An Analysis of Security Concerns in Transitioning Battery Management Systems from First to Second Life
    Julian Blümke (CARISSMA Institute of Electric, Connected and Secure Mobility, Technische Hochschule Ingolstadt, Germany), Kevin Gomez Buquerin (CARISSMA Institute of Electric, Connected and Secure Mobility, Technische Hochschule Ingolstadt, Germany), Hans-Joachim Hof (CARISSMA Institute of Electric, Connected and Secure Mobility, Technische Hochschule Ingolstadt, Germany)
    Full Paper
    With the ongoing shift to electric vehicles, lithium-ion batteries are becoming essential components for vehicles. Battery management systems manages these batteries. While battery management systems typically used to be placed deep in the vehicle architecture, away from the external facing surface of vehicles, they are now more and more connected to backend systems, e.g., to improve monitoring battery properties and optimize charging. Hence, battery management systems have moved closer to the attack surface, increasing the risk of security incidents in these systems. Also, batteries will soon be reused in so-called second life applications, e.g., as an energy storage system in a private home. While conventional methods involve removing the battery and reusing it with a new battery management system, modern methods use the original battery management system. Security controls already exist in first and second life applications. However, there is a lack of research activities regarding the transition phase. This paper analyzes the phase of transferring the battery management system from the first to the second life of particular relevance for security, privacy, and intellectual property. We try to close this research gap by analyzing the security aspects of a battery management system life cycle and its altering system environment. We are defining the transition phase, identifying necessary activities, and providing cybersecurity needs for the transitioning of battery management system from first to second life.
    Workshop EPESec

    Detail EPESec 02/05

    Topics of interest include, but are not limited to 03/05

    • Security policies
    • Risk analysis and management
    • Vulnerability assessment and metrics
    • Awareness, training and simulation
    • Security standards
    • Privacy and Anonymity in smart/ micro grids, privacy preserving technologies
    • Threat modeling and detection
    • Cyber threat intelligence
    • Federated machine learning
    • Security architectures
    • Access control
    • Malware and cyber weapons
    • Intrusion detection and visualization
    • Defense in depth
    • Monitoring and real time supervision
    • Perimeter security
    • Safety-security interactions
    • Cyber security engineering
    • Secure communication protocols
    • Formal models for security (attack trees, indicators of compromise, etc.)
    • Hardware Security
    • Resilient ICS/CPS
    • Application Security
    • Secure Firmware
    • Incident Response and Digital Forensics
    • Incidents and Security Information Sharing
    • Countermeasures and Mitigation Actions Recommendation
    • Case studies
    • Attack simulations
    • Penetration testing / ethical hacking in OT and IT
    • Data management and interoperability challenges
    • EPES market trends and business opportunities
    • Securing private data on Smartphones
    • Integrating mobile devices into the Cloud
    • Securing digital twins and their uses for security
    • Cyber-physical ranges to support security and resilience
    • Machine learning and AI for security and resilience
    • Security operations in OT
    • Incident response in OT
    • Attacks targeting OT systems

    Workshop Chairs 04/05

    Workshop Chairs

    Workshop Chairs Logo
    Vasileios Gkioulos
    Norwegian University of Science & Technology, Norway
    Workshop Chairs Logo
    Theodoros Rokkas
    inCITES Consulting, Luxembourg
    Workshop Chairs Logo
    Swarna Kumarswamy-Das
    TNO, Netherlands
    Workshop Chairs Logo
    Elvira Sánchez Ortiz
    ENCS, Netherlands

    Program Committee

    Aida Akbarzadeh | NTNU, Norway
    Irina Ciornei | University of Cyprus, KIOS Research and Innovation Centre of Excellence, Cyprus
    Sokratis Katsikas | NTNU, Norway
    Georgios Kavallieratos | NTNU, Norway
    Salvatore Maccarrone | ENCS, The Netherlands
    Luca Morgese | TNO, The Netherlands
    Grigore Stamatescu | TUV, Austria, Romania
    Ahmed Walid Amro | NTNU, Norway
    Andreas Zalonis | Netcompany, Luxembourg

    Submission 05/05

    Important Dates

    Extended Submission Deadline May 15, 2024
    Author Notification May 29, 2024
    Proceedings Version Jun 18, 2024
    ARES EU Projects Symposium Jul 30, 2024
    Conference Jul 30 — Aug 02, 2024
    Register here!
    Join us at ARES 2024 in Vienna, Austria