EPESec

5th International Workshop on Electrical Power and Energy Systems Safety, Security and Resilience
  • Date
    Jul 30, 2024
  • Location
    SR03
  • Duration
    10:30 — 14:30
Workshops Lettering

Workshop Chairs

Workshop Chairs Logo Workshop Chairs Logo Workshop Chairs Logo Workshop Chairs Logo
  • → Vasileios Gkioulos
  • → Theodoros Rokkas
  • → Swarna Kumarswamy-Das
  • → Elvira Sánchez Ortiz

Accepted Paper

Vulnerability management digital twin for energy systems
Jessica B. Heluany (Norwegian University of Science and Technology, Norway), Johannes Goetzfried (Siemens Energy AG - Industrial Cybersecurity, Germany), Bernhard Mehlig (Siemens Energy AG - Industrial Cybersecurity, Germany), Vasileios Gkioulos (Norwegian University of Science and Technology, Norway)
Full Paper
Increasing cyber attacks underscore the importance of addressing system vulnerabilities to reduce security risks. To structure our workflow of vulnerability management, we made use of relevant and widely adopted industrial standards, while also incorporating the concept of digital twins. Therefore, this research suggests a vulnerability management digital twin that aligns with the ISO 23247-2 framework. It specifically emphasizes recommendations for the ‘data collection’ function following the workflow outlined in IEC 62443-2-3, and exemplifying use cases based on a typical automation architecture of energy systems. We evaluated the CVSS framework to prioritize scores and also examined ways to integrate CVSS with other contextual information to develop a mitigation deployment strategy. The goal was to assist asset owners in optimizing resource utilization in addressing vulnerabilities.
Workshop EPESec
Anomaly detection mechanisms for in-vehicle and V2X systems
Alexios Lekidis (University of Thessaly, Greece)
Full Paper
Modern V2X systems have an increasing number of interfaces that allow remote connectivity, but also include the risk of exposure to cyber threats. The attack surface for such threats is hence constantly increasing and in combination with privacy issues that may arise through the presence of sensitive data from users in the V2X ecosystem, this necessitates the requirement for security mechanisms. However, the existing mechanisms to ensure protection against such threats face major hurdles, such as 1) the lack of in-vehicle addressing schemes, 2) the abundance of V2X interfaces and 3) the manufacturer-specific architecture of each vehicle consisting of a variety of different systems. On top of these hurdles, a solution should satisfy the real-time requirements of the resource-constrained in-vehicle architecture by remaining lightweight and highly reliable as well as by avoiding false positive indications and alarms. This article presents a novel anomaly detection solution for addressing the main challenges of security mechanisms by simultaneously keeping a minimal impact on the real-time in-vehicle requirements. The solution is demonstrated through an Electric Vehicle (EV) charging hub testbed that implements anomaly detection schemes to detect proof-of-concept cyber-attacks targeting EV charging profile and causing cascading effects by zeroing the vehicle speed.
Workshop EPESec
The Cyber Safe Position: An STPA for Safety, Security, and Resilience Co-Engineering Approach
Georgios Gkoktsis (Fraunhofer SIT | ATHENE, Germany), Ludger Peters (Fraunhofer SIT | ATHENE, Germany)
Full Paper
Model Based Security Engineering (MBSE) is a growing field of research, which is gaining popularity in the domain of Safety, Security, and Resilience Co-Engineering. The System Theoretic Process Analysis (STPA) is a method for systematically analyzing the behavior of complex systems to investigate their failure modes and the Unsafe Control Actions (UCA) that can lead to those failure modes. This paper expands the methodological scope of STPA, by including an iterative Root-Cause Analysis element, which examines the possible emergence of UCAs due to either malfunction, or malicious action. Output of the method are the attributes and constraints of Resilience Modes of system configuration and operation, named ''Cyber Safe Position`` (CSP). The proposed method is applied in the case study of a Photovoltaic Plant connected to a Virtual Power Plant (VPP).
Workshop EPESec
An Analysis of Security Concerns in Transitioning Battery Management Systems from First to Second Life
Julian Blümke (CARISSMA Institute of Electric, Connected and Secure Mobility, Technische Hochschule Ingolstadt, Germany), Kevin Gomez Buquerin (CARISSMA Institute of Electric, Connected and Secure Mobility, Technische Hochschule Ingolstadt, Germany), Hans-Joachim Hof (CARISSMA Institute of Electric, Connected and Secure Mobility, Technische Hochschule Ingolstadt, Germany)
Full Paper
With the ongoing shift to electric vehicles, lithium-ion batteries are becoming essential components for vehicles. Battery management systems manages these batteries. While battery management systems typically used to be placed deep in the vehicle architecture, away from the external facing surface of vehicles, they are now more and more connected to backend systems, e.g., to improve monitoring battery properties and optimize charging. Hence, battery management systems have moved closer to the attack surface, increasing the risk of security incidents in these systems. Also, batteries will soon be reused in so-called second life applications, e.g., as an energy storage system in a private home. While conventional methods involve removing the battery and reusing it with a new battery management system, modern methods use the original battery management system. Security controls already exist in first and second life applications. However, there is a lack of research activities regarding the transition phase. This paper analyzes the phase of transferring the battery management system from the first to the second life of particular relevance for security, privacy, and intellectual property. We try to close this research gap by analyzing the security aspects of a battery management system life cycle and its altering system environment. We are defining the transition phase, identifying necessary activities, and providing cybersecurity needs for the transitioning of battery management system from first to second life.
Workshop EPESec

Detail EPESec 02/05

Topics of interest include, but are not limited to 03/05

  • Security policies
  • Risk analysis and management
  • Vulnerability assessment and metrics
  • Awareness, training and simulation
  • Security standards
  • Privacy and Anonymity in smart/ micro grids, privacy preserving technologies
  • Threat modeling and detection
  • Cyber threat intelligence
  • Federated machine learning
  • Security architectures
  • Access control
  • Malware and cyber weapons
  • Intrusion detection and visualization
  • Defense in depth
  • Monitoring and real time supervision
  • Perimeter security
  • Safety-security interactions
  • Cyber security engineering
  • Secure communication protocols
  • Formal models for security (attack trees, indicators of compromise, etc.)
  • Hardware Security
  • Resilient ICS/CPS
  • Application Security
  • Secure Firmware
  • Incident Response and Digital Forensics
  • Incidents and Security Information Sharing
  • Countermeasures and Mitigation Actions Recommendation
  • Case studies
  • Attack simulations
  • Penetration testing / ethical hacking in OT and IT
  • Data management and interoperability challenges
  • EPES market trends and business opportunities
  • Securing private data on Smartphones
  • Integrating mobile devices into the Cloud
  • Securing digital twins and their uses for security
  • Cyber-physical ranges to support security and resilience
  • Machine learning and AI for security and resilience
  • Security operations in OT
  • Incident response in OT
  • Attacks targeting OT systems

Workshop Chairs 04/05

Workshop Chairs

Workshop Chairs Logo
Vasileios Gkioulos
Norwegian University of Science & Technology, Norway
Workshop Chairs Logo
Theodoros Rokkas
inCITES Consulting, Luxembourg
Workshop Chairs Logo
Swarna Kumarswamy-Das
TNO, Netherlands
Workshop Chairs Logo
Elvira Sánchez Ortiz
ENCS, Netherlands

Program Committee

Aida Akbarzadeh | NTNU, Norway
Irina Ciornei | University of Cyprus, KIOS Research and Innovation Centre of Excellence, Cyprus
Sokratis Katsikas | NTNU, Norway
Georgios Kavallieratos | NTNU, Norway
Salvatore Maccarrone | ENCS, The Netherlands
Luca Morgese | TNO, The Netherlands
Grigore Stamatescu | TUV, Austria, Romania
Ahmed Walid Amro | NTNU, Norway
Andreas Zalonis | Netcompany, Luxembourg

Submission 05/05

Important Dates

Extended Submission Deadline May 15, 2024
Author Notification May 29, 2024
Proceedings Version Jun 18, 2024
ARES EU Projects Symposium Jul 30, 2024
Conference Jul 30 — Aug 02, 2024
Join ARES 2025!

Join us at ARES 2025 in Ghent, Belgium