Team for Research in
Ubiquitous Secure Technology

SCS Header
Workshop Overview
Important Dates
Workshop Goals
More Information
Back to TRUST Conferences
Workshop Program

Below is the workshop technical program, including links to the accepted papers and workshop presentations.

0830-0840 Welcome
Saurabh Amin (University of California, Berkeley), Henrik Sandberg (Royal Institute of Technology, Sweden (KTH))
0840-0900 The VIKING Project - Towards more Secure SCADA Systems   Paper | Presentation
Gunnar Bjöerkman (ABB Utility Systems)
0900-0920 Detecting False Data Injection Attacks on DC State Estimation   Paper | Presentation
Rakesh B. Bobba (University of Illinois, Urbana-Champaign), Katherine M. Rogers (University of Illinois, Urbana-Champaign), Qiyan Wang (University of Illinois, Urbana-Champaign), Himanshu Khurana (University of Illinois, Urbana-Champaign), Klara Nahrstedt (University of Illinois, Urbana-Champaign), Thomas Overbye (University of Illinois, Urbana-Champaign)
0920-0940 Simulation of Network Security Attacks on SCADA Systems   Paper | Presentation
Rohan Chabukswar (Carnegie Mellon University), Bruno Sinopoli (Carnegie Mellon University), Gabor Karsai (Vanderbilt University), Annarita Giani (University of California, Berkeley), Himanshu Neema (Vanderbilt University), Andrew Davis (Vanderbilt University)
0940-1000 A K/N Attack-Resilient ICT Shield for SCADA Systems, with State Based Attack Detection   Paper | Presentation
Igor Nai Fovino (Joint Research Centre, EU Commission), Andrea Carcano (University of Insubria), Michele Guglielmi (Joint Research Centre, EU Commission), Marcelo Masera (Joint Research Centre, EU Commission)
1000-1020 BREAK
1020-1040 An Approach to Network Security Assessment based on Probabilistic on Probalistic Relational Models   Paper | Presentation
Fredrik Löf (Royal Institute of Technology, Sweden (KTH)), Johan Stomberg (Royal Institute of Technology, Sweden (KTH)), Teodor Sommestad (Royal Institute of Technology, Sweden (KTH)), Mathias Ekstedt (Royal Institute of Technology, Sweden (KTH)), Jonas Hallberg (Swedish Defence Research Agency (FOI), Johan Bengtsson (Swedish Defence Research Agency (FOI))
1040-1100 A Trust Based Distributed Kalman Filtering Approach for Mode Estimation in Power Systems   Paper | Presentation
Ion Matei (University of Maryland), Tao Jiang (University of Maryland), John Baras (University of Maryland)
1100-1120 False Data Injection Attacks in Cyber Physical Systems   Paper | Presentation
Yilin Mo (Carnegie Mellon University), Bruno Sinopoli (Carnegie Mellon University)
1120-1140 SCADA-specific Intrusion Detection/Prevention Systems: A Survey and Taxonomy   Paper | Presentation
Bonnie Zhu (University of California, Berkeley), Shankar Sastry (University of California, Berkeley)
1140-1200 Distributed Fault Detection for Interconnected Second-Order Systems with Applications to Power Networks   Paper | Presentation
Iman Shames (Royal Institute of Technology, Sweden (KTH)), André Teixeira (Royal Institute of Technology, Sweden (KTH)), Henrik Sandberg (Royal Institute of Technology, Sweden (KTH)), Karl H. Johansson (Royal Institute of Technology, Sweden (KTH))
1200-1315 LUNCH
1315-1330 On Security Indices for State Estimators in Power Networks   Paper | Presentation
Henrik Sandberg (Royal Institute of Technology, Sweden (KTH)), André Teixeira (Royal Institute of Technology, Sweden (KTH)), Karl Henrik Johansson (Royal Institute of Technology, Sweden (KTH))
1315-1430 Panel Discussion
Panelists: Alex Bayen (University of California, Berkeley), Gunnar Bjöerkman (ABB Utility Systems), Johan Håstad (Royal Institute of Technology, Sweden (KTH)), Shankar Sastry (University of California, Berkeley), Janos Sztipanovits (Vanderbilt University)
Moderator: Larry Rohrbough (University of California, Berkeley)
1430-1700 Tutorial
Miles McQueen (Idaho National Laboratory)
1700 Workshop Ends


footer logos