About
The recent advancements of ICT have given the opportunity to companies, public administrations and various Critical Infrastructures to offer new and innovative services and at the same time lower their operational costs. These advancements, however, were quickly adopted without proper evaluation of their impact on security, leaving current IT (Information Technology) and OT (Operation Technology) systems vulnerable to various kinds of cyberattacks. Furthermore, cybersecurity protection of IT and/or OT networks, data and storage areas in small and medium enterprises (SMEs) is also problematic since such companies do not have the resources, expertise as well as funds to support and maintain cybersecurity operations in their premises. The International workshop on Information & Operational Technology (IT & OT) security systems 2019 aims to bring together viewpoints from diverse areas to explore the commonalities of security problems and solutions for advancing the collective science and practice of IT and OT security protection as well as promote security awareness and cybersecurity solutions for the SME community.
Important Dates
Submission Deadline: | Jul 10 2019 |
Notification to Authors: | |
Camera-ready version: | Jul 30 2019 |
Call for papers
The recent advancements of ICT have given the opportunity to companies, public administrations and various Critical Infrastructures to offer new and innovative services and at the same time lower their operational costs. These advancements however, were quickly adopted without proper evaluation of their impact on security, leaving current IT (Information Technology) and OT (Operation Technology) systems vulnerable to various kinds of cyberattacks. The International workshop on Information & Operational Technology (IT & OT) security systems aims to bring together viewpoints from diverse areas to explore the commonalities of security problems and solutions for advancing the collective science and practice of IT and OT security protection.
List of Topics
- Security architectures and frameworks for enterprises, SMEs, public administration or critical infrastructures
- Threat models for IT and OT systems and communication networks
- Cyber-threat detection, classification and profiling, Incident management
- Security training and awareness
- Risk assessment – safety and security
- Security validation, testing platforms and developments
- Hardware security, Cryptographic engineering
- Intrusion Detection, Intrusion Prevention
- Secure Software Development, Malicious Code Analysis
- Digital Forensics
- Identity and access management
- Privacy Enabling Technologies
Papers will be judged on novelty, significance, correctness, and clarity. We expect all papers to provide enough detail to enable reproducibility of their experimental results.
Accepted papers will be published in esorics proceedings volume, part of Lecture Notes in Computer Science by Springer.
Submission Guidelines
Each paper must include an abstract and a list of keywords, and must not exceed 16 pages in total length, formatted in LNCS-style and including the bibliography and any appendices. Papers can be submitted on the following link: https://easychair.org/conferences/?conf=iosec2019
Registration
IOSEC 2019 workshop is supported by SMESEC project
Complete your registration here:
https://snt.ldorganisation.lu/v2/register_new.php?langue=english&cle_menus=1240000035&cle_data=22Committees
General Chairs
Dr. Sotiris Ioannidis | Foundation for Research and Technology - Hellas |
Dr. Apostolos P. Fournaris | University of Patras |
Publication and Publicity Chair
Manos Athanatos | Foundation for Research and Technology - Hellas |
Dr. Konstantinos Lampropoulos | University of Patras |
Technical Program Committee
Apostolis Zarras | Maastricht University |
Apostolos P. Fournaris | Industrial Systems Institute/R.C. ATHENA, University of Patra |
Christos Tselios | Citrix Systems Inc |
Ciprian Oprisa | Bitdefender |
Dimitrios Serpanos | Industrial Systems Institute/R.C. ATHENA, University of Patra |
Dusan Jakovetic | University of Novi Sad |
Elias Athanasopoulos | University of Cyprus |
Francesco Regazzoni | University of Lugano |
Giorgos Vasiliadis | Foundation for Research and Technology - Hellas |
Jose F. Ruiz | Atos |
Manos Athanatos | Foundation for Research and Technology - Hellas |
Marco Spruit | Universiteit Utrecht |
Michael Sirivianos | Cyprus University of Technology |
Neeraj Suri | Technical University of Darmstadt |
Nicolas Sklavos | University of Patras |
Odysseas Koufopavlou | University of Patras |
Paris Kitsos | University of Peloponnese |
Rodrigo Díaz | Atos |
Samuel Fricker | FHNW Fachhochschule Nordwestschweiz |
Sotiris Ioannidis | Foundation for Research and Technology - Hellas |
Spyros Denazis | University of Patras |
Stefan Katzenbeisser | Technical University of Darmstadt |
Vassilis Prevelakis | TU Braunschweig |
Xavi Masip | Universitat Politècnica de Catalunya |
Fady Copty | IBM Research Haifa |
Workshop Program
Thursday, September 26, 2019
08:30-08:45
Registration
08:45-10:00
General Welcome IOSEC & Opening Keynote Chairs: Apostolos P. Fournaris & Sotiris Ioannidis Room: 006
Cybersecurity for the Protection of Critical Infrastructures
Prof. Vasilis Prevelakis
10:00-10:30
Coffee Break
10:30-12:00
Session 1: IOSEC (Web-based Attacks & Technologies)
Chair: Konstantinos Lampropoulos Room: 006
10:30-10:50 Event-Based Remote Attacks in HTML5-Based Mobile Apps
Tuong Lau
10:50-11:10 Web Servers Protection Using Anomaly Detection for HTTP Requests
Paul Satmarean and Ciprian Oprisa
11:10-11:30 Secure Data Exchange for Computationally Constrained Devices
Vassilis Prevelakis, Mohammad Hamad, Jihane Najar and Ilias Spais
11:30-11:50 You Shall Not Register! Detecting Privacy Leaks across Registration Forms
Manolis Chatzimpyrros, Konstantinos Solomos and Sotiris Ioannidis
12:00-13:00
Lunch Break
13:30-15:00
Session 2: IOSEC (SME Security)
Chair: Vasilis Prevelakis Room:006
13:30-13:50 Horizontal Attacks against ECC: from Simulations to ASIC
Ievgen Kabin, Zoya Dyka, Dan Klann and Peter Langendoerfer
13:50-14:10 Deploying Fog-to-Cloud Towards a Security Architecture for Critical Infrastructure Scenarios, By Sarang Kahvazadeh
Xavi Masip-Bruin, Pau Marcer and Eva Marín-Tordera
14:10-14:30 A comprehensive technical survey of contemporary cybersecurity products and solutions
Christos Tselios, George Tsolis and Manos Athanatos
14:30-14:50 CyberSure: A Framework for Liability Based Trust
George Christou, Eva Papadogiannaki, Michalis Diamantaris, Livia Torterolo and Panos Chatziadam
15:00-15:30
Coffee Break
15:30-17:30
Session 3: MSTEC (Introduction & Cyber Range Platforms)
Chair: Sotiris Ioannidis Room: 006
15:30-16:00 The THREAT-ARREST Cyber-Security Training Platform
Othonas Soultatos, Konstantinos Fysarakis, George Spanoudakis, Hristo Koshutanski, Ernesto Damiani, Kristian Beckers, Dirk Wortmann, George Bravos, and Menelaos Ioannidis
16:00-16:30 An Open and Flexible CyberSecurity Training Laboratory in IT/OT Infrastructures
Umberto Morelli, Lorenzo Nicolodi, Silvio Ranise
16:30-17:00 Model-driven Cyber Range Training - The Cyber Security Assurance Perspective
Iason Somarakis, Michail Smyrlis, Konstantinos Fysarakis, and George Spanoudakis
17:00-17:30 A model-driven approach for cyber security scenarios deployment
Chiara Braghin, By Stelvio Cimato, Ernesto Damiani, Fulvio Frati, Lara Mauri, Elvinia Riccobene
15:30-20:30
Social Activity
20:30-22:00
Gala Dinner
Contact Us
Organizing Committee: | Sotiris Ioannidis: | sotiris [at] ics.forth.gr |
Organizing Committee: | Apostolos P. Fournaris: | apofour [at] ece.upatras.gr |
Publication and Publicity Chairs: | Kostas Lampropoulos: | klamprop [at] ece.upatras.gr |
Publication and Publicity Chairs: | Manos Athanatos: | athanat [at] ics.forth.gr |