Workshop on European Smart Grid Cybersecurity: Emerging Threats and Countermeasures

workshop-bannerPrint

Friday, 26th August 2016, Belfast UK

Co-located with the 4th International Symposium for ICS & SCADA Cyber Security Research (ICS-CSR) 2016.

Contents

Workshop Aims

In this workshop — the third in a series that is organised by the EU-funded SPARKS project — we examine the emerging cybersecurity threat to electrical energy systems and the future smart grid, presenting the research-driven security and resilience countermeasures that can be applied to address these threats. In particular, we will focus on the emerging cyber-physical threat, as seen in the Ukraine in December, 2015, wherein cyber-attacks result in operational consequences, such as blackouts or equipment damage. We will demonstrate a sophisticated multistage cyber-physical attack and an intrusion detection system that can detect the manipulation of SCADA protocols, used by the attackers. Additionally, the workshop programme includes presentations on cybersecurity risk assessment, enabling one to examine the risks associated with the emerging threat, and security analytics for the smart grid. A number of posters and further demonstrations will be presented on key security issues and technologies for the smart grid; the aim is to facilitate in-depth discussions between attendees and leading European smart grid cybersecurity researchers.

Workshop Programme

The final programme for the workshop will be made available nearer the time. The workshop will start at 08:30 with registration and end at 13:30 on Friday, 26th August.

TimeProgramme Item
08:30 - 09:00Registration and Coffee
09:00 – 09:15Welcome and Workshop Aims [Slides]
Dr Paul Smith, AIT Austrian Institute of Technology
09:15 – 09:45The SEGRID Approach to Threat and Risk Assessment for the Smart Grid [Slides][Video]
Dr Judith Rossebo, ABB
09:45 – 10:15Physical Uncloneable Functions for Smart Meter Security [Slides][Video]
Dr Chongyan Gu, Queen’s University Belfast
10:15 – 10:45Multistage Cyber-physical Attack and SCADA Intrusion Detection System Demonstration [Slides][Video]
Dr Kieran McLaughlin, et al., Queen’s University Belfast
10:45 - 11:45Posters and Demonstrations
11:45 – 12:15Security Analytics for the Smart Grid [Slides][Video]
Dr Andrew Byrne, EMC Corporation/RSA
12:15 – 12:45European NIS-Directive and the Smart Grid [Slides][Video]
Ms Marie-Theres Holzleitner, Energy Institute at the J. Kepler University Linz
12:45 – 13:00Closing Remarks
Dr Paul Smith, AIT Austrian Institute of Technology

Posters and Technology Demonstrations

During the coffee break at the workshop, there will be an opportunity to have in-depth discussions with leading researchers in Europe on topics that are related the cybersecurity of the smart grid. Researchers will present their research activities on posters and selected technology demonstrators. Details of the posters and demonstrations are provided below.

List of Posters

Cyber-Physical Security Framework for Energy Management Systems
K. Paridari, A. H. Teixeira and H. Sandberg (KTH Royal Institute of Technology)
A. E. Din Mady, R. Chabukswar and M. Boubekeur (United Technologies Research Center)
S. La Porta and J. Blanco (EMC Corporation)
A SCADA Intrusion Detection System
K. McLaughlin and B. Kang (Queen's University Belfast)
Resilient Smart Grid Control in the Face of Cyber Attacks
Ivo Friedberg and Kieran McLaughlin (Queen's University Belfast)
Paul Smith (AIT Austrian Institute of Technology)
Cybersecurity Risk Management for the Smart Grid
E. Piatkowska, M. Findrik and P. Smith (AIT Austrian Institute of Technology)
M. Hutle (Fraunhofer AISEC)
W. Fitzgerald (United Technologies Research Center)
H. Sandberg (KTH Royal Institute of Technology)
Voltage Control for Interconnected Microgrids under Adversarial Actions
A. H. Teixeira, K. Paridari, H. Sandberg and K. H. Johansson (KTH Royal Institute of Technology)
Cyber-attack Imapct Assessment using Co-simulation Approaches
M. Findrik (AIT Austrian Institute of Technology)
N. Wiedermann (Fraunhofer AISEC)
Threat Analysis Using a Hybrid Attack Tree and Semantic Threat Graph Approach
G. Hansch and M. Hutle (Fraunhofer AISEC)
W. Fitzgerald (United Technologies Research Center)
The CAPRICA Project - A Converged Approach Towards Resilient Industrial Control Systems and Cyber Assurance
S. Sezer, K. McLaughlin, D. Laverty, S. McLoone, D.J. Morrow, G. McWilliams, R. Khan, X. Zhao, M. Jacobsen and I. Friedberg (Queen's University Belfast)
The HyRiM Project - Hybrid Risk Management for Utility Providers
A.M.A. Beltrán (ETRA I+D)
S. Schauer (AIT Austrian Institute of Technology)
Risk Mitigation in ICSs using CyberMon for Anomaly Detection (The PREEMPTIVE Project)
D. Lund and B. Kassim (HW Communications)
A DSO Case Study - Cyber Risk Assessment and Cost Impact Evaluation
G. Kleineidam and G. Meindl (SWW Wunsiedel GmbH)
The ECOSSIAN project - European COntrol System Security Incident Analysis Network
Barara Gaggl (Technikon Forschungs- und Planungsgesellschaft mbH)

Demonstrations

In addition to the demonstration that will be shown as part of the main workshop programme, during the coffee break, two additional demonstrations will be presented.

Security Information Analytic for Smart Grid

Silvio La Porta, EMC Corporation

In this demo, we will show how a Security Information Analytics tool detects anomalies in real-world data taken from a microgrid environment. The tool includes different algorithms, including those based on machine-learning, to reduce the number of false positives, i.e., incorrectly detecting normal behaviour as malicious. The demo will showcase how Security Information Analytics helps analysts detect the most important anomalies, and makes the investigation of incidents easier and faster.

Physical Uncloneable Functions for Smart Meter Security

Neil Hanely, Queen’s University Belfast

Robert Hesselbarth, Martin Hutle and Dieter Schuster, Fraunhofer AISEC

In this demo, we will exhibit the hardware environment that we are using to identify suitable Physical Uncloneable Function (PUF) designs for smart meter (and gateway) security. The aim of this activity is to investigate the use of low-cost, hardware implementations of PUFs on smart meters and gateways as a highly secure and cost effective way to assert identity and generate cryptographic keys. As part of our investigation, we are investigating PUF designs that are resistant to side-channel attacks using a unique (in its scale) PUF testbed facility that has been created for the SPARKS project.

ICS-CSR Student Travel Grants

The Workshop on European Smart Grid Cybersecurity: Emerging Threats and Countermeasures will be co-located with ICS-CSR 2016, which will take place from the 23rd – 25th August, prior to the workshop. To support students attending both events, the SPARKS project is offering a number of student travel grants. Financial support will be provided for travel, attendance and registration costs, so that students can attend the ICS-CSR Symposium and the workshop. This support will be provided by reimbursing costs, i.e., the costs will have to be paid upfront and subsequently reimbursed. To apply for a student travel grant, please provide a short summary of your research topic (2 to 3 paragraphs), highlighting its relevance to the ICS-CSR and SPARKS workshop aims, and a reference letter from your advisor. Additionally, please provide an indication of the costs for travel and accommodation.

Enquiries and applications should be sent to the SPARKS management team by Friday 17th June, 2016.

Location Information

The workshop will be held in Belfast, UK at the Centre for Secure Information Technologies (CSIT) at Queen’s University Belfast. The address is:

The Institute of Electronics, Communications and Information Technology (ECIT)
Queen’s University Belfast
NI Science Park
Queen’s Road
Queen’s Island
Belfast
BT3 9DT

Registration

Attendance at the workshop is for free; however, space is limited. Please complete the form below and we will contact you to confirm your registration.

Name:*
E-mail:*
Company:*
Comments (e.g., dietary requirements):
Please enter the characters you see here: