{"id":793,"date":"2022-05-25T13:25:32","date_gmt":"2022-05-25T13:25:32","guid":{"rendered":"https:\/\/safeprocess2021.eu\/?page_id=793"},"modified":"2022-06-01T09:30:15","modified_gmt":"2022-06-01T09:30:15","slug":"workshop-2","status":"publish","type":"page","link":"https:\/\/safeprocess2021.eu\/?page_id=793","title":{"rendered":"Workshop 2"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\"><em><em>Safety,&nbsp;Security and Privacy for Cyber&nbsp;Physical Systems<\/em><\/em><\/h3>\n\n\n\n<p><strong>Abstract:<\/strong><\/p>\n\n\n\n<p> Cyber-physical&nbsp;&nbsp;systems&nbsp;&nbsp;(CPSs)&nbsp;&nbsp;are&nbsp;&nbsp;a&nbsp;&nbsp;class&nbsp;&nbsp;of&nbsp;&nbsp;networked&nbsp;&nbsp;control&nbsp;&nbsp;systems&nbsp;&nbsp;with vast&nbsp;&nbsp;and&nbsp;&nbsp;promising&nbsp;&nbsp;applications.&nbsp;&nbsp;This&nbsp;&nbsp;class&nbsp;&nbsp;may&nbsp;&nbsp;include&nbsp;&nbsp;for&nbsp;&nbsp;instance&nbsp;&nbsp;smart&nbsp;&nbsp;cities,&nbsp;&nbsp;intelligent&nbsp;transportation systems based on fleets of cooperative and autonomous vehicles&nbsp;or distributed sensing and control solutions that leverage Internet-of-Things&nbsp;(IoT) devices. As a common trait, these systems are expected to provide&nbsp;important functionalities that may positively influence our life and society.&nbsp;However, said positive outcomes may be hindered by novel threats to the&nbsp;safety of CPSs, such as malicious cyber-attacks that could negatively affect&nbsp;the physical domain. Furthermore, the sheer amount of data gathered,&nbsp;exchanged and processed by those architectures are going to pose fundamental&nbsp;societal interrogatives regarding privacy and confidentiality, and the fair&nbsp;use of such data. The proposed workshop will present to attendee foundational&nbsp;and advanced solutions to the challenge of making CPS safe and, ultimately,&nbsp;resilient to external hazards. Theoretical topics addressed will include the&nbsp;design of resilient controllers, information-theoretic approaches to privacy,&nbsp;the characterization and detection of stealthy false data attacks and&nbsp;watermarking and encryption approaches to securing networked control systems.&nbsp;The workshop will also address practical cases of interest, such as&nbsp;microgrids, and the security of Industrial Control Systems as seen by a&nbsp;security expert.<\/p>\n\n\n\n<p><strong>Date:<\/strong>&nbsp;Thursday, June 9, 2022<\/p>\n\n\n\n<p><strong>Organizer:<\/strong>&nbsp;Prof. Riccardo M.G. Ferrari, Delft University of Technology, The Netherlands<\/p>\n\n\n\n<p><strong>Speakers:<\/strong> <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li style=\"font-size: 18px;\"><strong>Prof. Riccardo M.G. Ferrari<\/strong>,<em> Delft University of Technology, The Netherlands.<\/em><\/li><li style=\"font-size: 18px;\"><strong>Prof. Mahdieh Sadabadi<\/strong>,<em> Queen Mary University, UK<\/em>.<\/li><li style=\"font-size: 18px;\"><strong>Prof. Ehsan Nekouei<\/strong>,<em> City University of Hong Kong, Hong Kong<\/em>.<\/li><li style=\"font-size: 18px;\"><strong>Prof. Henrik Sandberg<\/strong>,<strong> <\/strong><em>KTH Royal Institute of Technology, Sweden<\/em>.<\/li><li style=\"font-size: 18px;\"><strong>Dr.<\/strong> <strong>Marina Krotofil<\/strong>, <em>ISSP &#8211; Information Systems Security Partners.<\/em><\/li><\/ul>\n\n\n\n<h5 class=\"wp-block-heading\">Workshop Program<\/h5>\n\n\n\n<p><strong>Session I<\/strong><\/p>\n\n\n\n<p>&#8211; <strong>14:20 \u2013 14:30:<\/strong> Introduction to the Workshop Session &#8211; <em>Prof. Riccardo M.G. Ferrari.<\/em><\/p>\n\n\n\n<p>&#8211; <strong>14:30 \u2013 15:05:<\/strong> Cybersecurity Challenges in Power-Electronics-Dominated Microgrids &#8211; <em>Prof. Mahdieh Sadabadi<\/em>.<\/p>\n\n\n\n<p>&#8211; <strong>15:05 \u2013 15:40:<\/strong> Privacy and Security of Networked Control Systems &#8211; <em>Prof. Ehsan Nekouei.<\/em><\/p>\n\n\n\n<p>&#8211; <strong>15:40 \u2013 16:30:<\/strong> Stealthy False Data Injection Attacks in Feedback Systems Revisited &#8211; <em>Prof. Henrik Sandberg<\/em>.<\/p>\n\n\n\n<p><em>16:30 &#8211; 16:45: Coffee Break<\/em><\/p>\n\n\n\n<p><strong>Session II<\/strong><\/p>\n\n\n\n<p><strong>&#8211; 16:45 \u2013 17:20: <\/strong> From Watermarking to Encryption &#8211;  Prof. <em>Prof. Riccardo M.G. Ferrari.<\/em><\/p>\n\n\n\n<p>&#8211; <strong>17:20 \u2013 17:55:<\/strong> Industrial Control Systems Security: An Industrial Perspective (tentative) &#8211; <em>Dr. Marina Krotofil<\/em>.<\/p>\n\n\n\n<p>&#8211; <strong>17:55 \u2013 18:10:<\/strong> Final Discussion.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n","protected":false},"excerpt":{"rendered":"<p>Safety,&nbsp;Security and Privacy for Cyber&nbsp;Physical Systems Abstract: Cyber-physical&nbsp;&nbsp;systems&nbsp;&nbsp;(CPSs)&nbsp;&nbsp;are&nbsp;&nbsp;a&nbsp;&nbsp;class&nbsp;&nbsp;of&nbsp;&nbsp;networked&nbsp;&nbsp;control&nbsp;&nbsp;systems&nbsp;&nbsp;with vast&nbsp;&nbsp;and&nbsp;&nbsp;promising&nbsp;&nbsp;applications.&nbsp;&nbsp;This&nbsp;&nbsp;class&nbsp;&nbsp;may&nbsp;&nbsp;include&nbsp;&nbsp;for&nbsp;&nbsp;instance&nbsp;&nbsp;smart&nbsp;&nbsp;cities,&nbsp;&nbsp;intelligent&nbsp;transportation systems based on fleets of cooperative and autonomous vehicles&nbsp;or distributed sensing and control solutions that leverage Internet-of-Things&nbsp;(IoT) devices. As a common trait, these systems are expected to provide&nbsp;important functionalities that may positively influence our&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-793","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/safeprocess2021.eu\/index.php?rest_route=\/wp\/v2\/pages\/793","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/safeprocess2021.eu\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/safeprocess2021.eu\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/safeprocess2021.eu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/safeprocess2021.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=793"}],"version-history":[{"count":18,"href":"https:\/\/safeprocess2021.eu\/index.php?rest_route=\/wp\/v2\/pages\/793\/revisions"}],"predecessor-version":[{"id":880,"href":"https:\/\/safeprocess2021.eu\/index.php?rest_route=\/wp\/v2\/pages\/793\/revisions\/880"}],"wp:attachment":[{"href":"https:\/\/safeprocess2021.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=793"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}