About

The recent advancements of ICT have given the opportunity to companies, public administrations and various Critical Infrastructures to offer new and innovative services and at the same time lower their operational costs. These advancements, however, were quickly adopted without proper evaluation of their impact on security, leaving current IT (Information Technology) and OT (Operation Technology) systems vulnerable to various kinds of cyberattacks. Furthermore, cybersecurity protection of IT and/or OT networks, data and storage areas in small and medium enterprises (SMEs) is also problematic since such companies do not have the resources, expertise as well as funds to support and maintain cybersecurity operations in their premises. The International workshop on Information & Operational Technology (IT & OT) security systems 2019 aims to bring together viewpoints from diverse areas to explore the commonalities of security problems and solutions for advancing the collective science and practice of IT and OT security protection as well as promote security awareness and cybersecurity solutions for the SME community.

Important Dates

Submission Deadline: Jul 10 2019
Notification to Authors: Jul 22 2019
Camera-ready version: Jul 30 2019

Call for papers

The recent advancements of ICT have given the opportunity to companies, public administrations and various Critical Infrastructures to offer new and innovative services and at the same time lower their operational costs. These advancements however, were quickly adopted without proper evaluation of their impact on security, leaving current IT (Information Technology) and OT (Operation Technology) systems vulnerable to various kinds of cyberattacks. The International workshop on Information & Operational Technology (IT & OT) security systems aims to bring together viewpoints from diverse areas to explore the commonalities of security problems and solutions for advancing the collective science and practice of IT and OT security protection.

List of Topics

  • Security architectures and frameworks for enterprises, SMEs, public administration or critical infrastructures
  • Threat models for IT and OT systems and communication networks
  • Cyber-threat detection, classification and profiling, Incident management
  • Security training and awareness
  • Risk assessment – safety and security
  • Security validation, testing platforms and developments
  • Hardware security, Cryptographic engineering
  • Intrusion Detection, Intrusion Prevention
  • Secure Software Development, Malicious Code Analysis
  • Digital Forensics
  • Identity and access management
  • Privacy Enabling Technologies

Papers will be judged on novelty, significance, correctness, and clarity. We expect all papers to provide enough detail to enable reproducibility of their experimental results.

Accepted papers will be published in esorics proceedings volume, part of Lecture Notes in Computer Science by Springer.

Submission Guidelines

Each paper must include an abstract and a list of keywords, and must not exceed 16 pages in total length, formatted in LNCS-style and including the bibliography and any appendices. Papers can be submitted on the following link: https://easychair.org/conferences/?conf=iosec2019

Registration

IOSec

Committees

General Chairs

Dr. Sotiris Ioannidis Foundation for Research and Technology - Hellas
Dr. Apostolos P. Fournaris University of Patras

Publication and Publicity Chair

Manos Athanatos Foundation for Research and Technology - Hellas
Dr. Konstantinos Lampropoulos University of Patras

Technical Program Committee

Apostolis Zarras Maastricht University
Apostolos P. Fournaris Industrial Systems Institute/R.C. ATHENA, University of Patra
Christos Tselios Citrix Systems Inc
Ciprian Oprisa Bitdefender
Dimitrios Serpanos Industrial Systems Institute/R.C. ATHENA, University of Patra
Dusan Jakovetic University of Novi Sad
Elias Athanasopoulos University of Cyprus
Francesco Regazzoni University of Lugano
Giorgos Vasiliadis Foundation for Research and Technology - Hellas
Jose F. Ruiz Atos
Manos Athanatos Foundation for Research and Technology - Hellas
Marco Spruit Universiteit Utrecht
Michael Sirivianos Cyprus University of Technology
Neeraj Suri Technical University of Darmstadt
Nicolas Sklavos University of Patras
Odysseas Koufopavlou University of Patras
Paris Kitsos University of Peloponnese
Rodrigo Díaz Atos
Samuel Fricker FHNW Fachhochschule Nordwestschweiz
Sotiris Ioannidis Foundation for Research and Technology - Hellas
Spyros Denazis University of Patras
Stefan Katzenbeisser Technical University of Darmstadt
Vassilis Prevelakis TU Braunschweig
Xavi Masip Universitat Politècnica de Catalunya
Fady Copty IBM Research Haifa

Workshop Program

Thursday, September 26, 2019

08:30-08:45

Registration

08:45-10:00

General Welcome IOSEC & Opening Keynote Chairs: Apostolos P. Fournaris & Sotiris Ioannidis Room: 006

Cybersecurity for the Protection of Critical Infrastructures

Prof. Vasilis Prevelakis

10:00-10:30

Coffee Break

10:30-12:00

Session 1: IOSEC (Web-based Attacks & Technologies)

Chair: Konstantinos Lampropoulos Room: 006

10:30-10:50 Event-Based Remote Attacks in HTML5-Based Mobile Apps

Tuong Lau

10:50-11:10 Web Servers Protection Using Anomaly Detection for HTTP Requests

Paul Satmarean and Ciprian Oprisa

11:10-11:30 Secure Data Exchange for Computationally Constrained Devices

Vassilis Prevelakis, Mohammad Hamad, Jihane Najar and Ilias Spais

11:30-11:50 You Shall Not Register! Detecting Privacy Leaks across Registration Forms

Manolis Chatzimpyrros, Konstantinos Solomos and Sotiris Ioannidis

12:00-13:00

Lunch Break

13:30-15:00

Session 2: IOSEC (SME Security)

Chair: Vasilis Prevelakis Room:006

13:30-13:50 Horizontal Attacks against ECC: from Simulations to ASIC

Ievgen Kabin, Zoya Dyka, Dan Klann and Peter Langendoerfer

13:50-14:10 Deploying Fog-to-Cloud Towards a Security Architecture for Critical Infrastructure Scenarios, By Sarang Kahvazadeh

Xavi Masip-Bruin, Pau Marcer and Eva Marín-Tordera

14:10-14:30 A comprehensive technical survey of contemporary cybersecurity products and solutions

Christos Tselios, George Tsolis and Manos Athanatos

14:30-14:50 CyberSure: A Framework for Liability Based Trust

George Christou, Eva Papadogiannaki, Michalis Diamantaris, Livia Torterolo and Panos Chatziadam 

15:00-15:30

Coffee Break

15:30-17:30

Session 3: MSTEC (Introduction & Cyber Range Platforms)

Chair: Sotiris Ioannidis Room: 006

15:30-16:00 The THREAT-ARREST Cyber-Security Training Platform

Othonas Soultatos, Konstantinos Fysarakis, George Spanoudakis, Hristo Koshutanski, Ernesto Damiani, Kristian Beckers, Dirk Wortmann, George Bravos, and Menelaos Ioannidis 

16:00-16:30 An Open and Flexible CyberSecurity Training Laboratory in IT/OT Infrastructures

Umberto Morelli, Lorenzo Nicolodi, Silvio Ranise 

16:30-17:00 Model-driven Cyber Range Training - The Cyber Security Assurance Perspective

Iason Somarakis, Michail Smyrlis, Konstantinos Fysarakis, and George Spanoudakis

17:00-17:30 A model-driven approach for cyber security scenarios deployment

Chiara Braghin, By Stelvio Cimato, Ernesto Damiani, Fulvio Frati, Lara Mauri, Elvinia Riccobene

15:30-20:30

Social Activity

20:30-22:00

Gala Dinner

Contact Us

Organizing Committee: Sotiris Ioannidis: sotiris [at] ics.forth.gr
Organizing Committee: Apostolos P. Fournaris: apofour [at] ece.upatras.gr
Publication and Publicity Chairs: Kostas Lampropoulos: klamprop [at] ece.upatras.gr
Publication and Publicity Chairs: Manos Athanatos: athanat [at] ics.forth.gr