ECSaR Workshop


International Workshop on Engineering Cyber Security and Resilience

ECSaR’14 –

May 31, 2014, Stanford, CA, USA

Call for Papers

Important Deadlines
Paper Submission: April 1, 2014
Accept/Reject Notification: April 30, 2014
Camera-ready manuscripts: May 7, 2014
Poster Submission: May 2, 2014

One highlight of the workshop program will be a panel which brings together industry experts in the field:

David Mattes (Founder and Director of Asguard Networks)
Stacy Cannady (Cisco and Board of Directors of the Trusted Computing Group)
Steve Venema (Associate Technical Fellow at The Boeing Company) (TBD)
Ron Ross (NIST) (TBD)
David Manz (PNNL) (TBD)

Panel Topic: Do I Trust You? A Discussion on Trust, Security and Internet-connected Devices Today and Tomorrow

Just as we’ve started to work through the implications of trust – and to make traditional computers more secure – the Internet of Things and related systems and networks have exploded. Whether automobiles, appliances or factory automation, these connected devices with computing power and access to data represent a very real threat to daily lives. This panel, with experts on trusted computing, networks and industrial control systems, will talk about the differences between trust and security, how trust can be established and the value of embedded trust. Using their extensive experience in the field, panelists will look at what requirements must be addressed to ensure more trustworthy systems and look at trends in solutions and implementation.

Control systems and equipmentare a vital part of modern and future networks in various application areas such as energy generation and distribution, traffic control or food production. Examples like SmartGrids or SmartCities demonstrate the dependence of future societies on communication and control systems. Centralized control is being replaced by distributed and more open control systems that possess increasing levels of autonomy. Communication networks and intelligent systems are at the core of these developments. Security and resilience are essential for these infrastructures. Therefore, achieving resilience and cyber security in the complex, interconnected, and interdependent systems of today requires an integrated approach in engineering to address of security considerations across all constituent systems, cyber and physical. Further, systems engineering and solutions (and also forensic design) for cyber environments needs to consider a wider event horizon and high levels of uncertainty.

The new ECSaR workshop focuses on the challenges of engineering, operating and sustaining and managing resilient control systems as one essential factor for cyber security. The workshop is planned as a forum to discuss how to improve the resilience of modern complex control systems and the engineering processes for building such systems. It will present for discussion novel and promising ideas towards applicable concepts for security in control systems and to develop adequate approaches to risk measurement estimation and risk mitigation. ECSaR invites original work focused but not limited to the following topics:

Engineering for Cyber Security

  • Security in Systems Engineering
  • Cyber-Security Engineering Processes
  • Models and Metamodels for Security and Resilience
  • Processes and Tools for Integrating Security and Software Engineering
  • Security Patterns and Certification
  • Security Analysis and Assurance
  • Security Requirements Engineering

Risk Modelling and Risk Assessment

  • Security Measurement and Metrics
  • Risk Models
  • Risk Management and Assessment
  • Uncertainty and Rare/Catastrophic Events in Risk Estimations

Technical Solutions for Control Systems

  • Advanced Technical Solutions for SCADA Security
  • Case Studies on Security Issues in Critical Infrastructures
  • Asymmetric Detection, Mitigation and Management
  • Distributed Reaction and Active Defense for Resilience

Important Deadlines

Paper Submission: April 1, 2014

Accept/Reject Notification: April 30, 2014

Camera-ready manuscripts: May 7, 2014

Poster Submission: May 2, 2014

Submission Instructions

Submissions must be written in English and are accepted as full paper with at most 6 pages excluding the bibliography or posters. Committee members are not required to read appendices so the paper should be intelligible without them. The style of the manuscripts must follow the ASE style and can be found at We reserve the right to request the sources files for a submission to verify compliance with this requirement.

Submissions will be done using Easy Chair:

All submissions must be anonymized. Authors name should occur only in references, which should be referenced in the third person and not overly distinguishable from the referenced work of others. Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Authors of accepted papers must guarantee that their papers will be presented at the conference.

All the accepted papers will be published in the ASE Public Scientific Digital Library and the top 2% in the ASE Science Journal.

Workshop Registration: Online Registration

Workshop Organization

 Conference Chair
Rudolph, Carsten, Fraunhofer SIT, Germany
Technical Program Chairs
Security Engineering: 
Maña, Antonio, University of Malaga, Spain
Risk Modelling:
Ross, Ron, NIST, US
Technical Solutions:
Manz, David, PNNL, US
Publicity Chair
Endicott-Popovsky, Barbara, University of Washington
Technical Program Co-Chair
Ruiz, Jose Francisco, University of Malaga, Spain
Kuntze, Nicolai, Fraunhofer SIT, Germany
Technology and Industrial Relations Chair
McEvilley, Michael, The MITRE Corporation, US
Leivesley, Sally, Newrisk Limited, UK
Program Committee 
Ardagna, Claudio, Università degli Studi di Milano, Italy
Arjona, Marcos, University of Malaga, Spain
Badger, Lee, NIST, US
Blundo, Carlo, University of Salerno, Italy
Breuer, Peter, University of Birmingham, UK
Calloni, Ben, Lockheed Martin, US
Cuellar, Jorge, Siemens AG, Germany
Di Pietro, Roberto, Universita di Roma, Italy
Fernandez, Eduardo, Florida Atlantic University, USA
Frincke, Deborah, NSA/CSS, US
García Rosado, David, Universidad de Castilla la Mancha, Spain
Gürgens, Sigrid, Fraunhofer SIT, Germany
Jones, Kevin, City University London, U. K.
Hamid, Brahim, University of Toulouse, France
Hild, Daryl, The MITRE Corporation, US
Holtzman, Danny, The MITRE Corporation, US, US
Karnouskos, Stamatis, SAP, Germany
Katsikas, Sokratis, University of Piraeus, Greece
Kemmerich, Thomas, Norwegian Information Security laboratory, Norway
Lambrinoudakis, Costas, University of Piraeus, Greece
Laurent, Maryline, Institut Mines-Télécom, Télécom Sud Paris, France
Martinelli, Fabio, CNR-IIT, Italy
Martinez Perez, Gregorio, University of Murcia, Spain
Mouratidis, Haris, University of East London, UK
Naccache, David, ENS, France
Oren, Janet C., NSA, US
Pearson, Siani, HP Labs, UK
Quisquater, Jean-Jacques, Université Catholique De Louvain, Belgium
Rass, Stefan, Alpen-Adria Universitaet Klagenfurt, Austria
Savas, Erkay, Sabanci University, Turkey
Stouffer, Keith, NIST, US
Turner, Glenda, The MITRE Corporation, US, US
Voas, Jeff, NIST, US
Zisman, Andrea, City University of London, UK

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>