skip to main content
article

Report on the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS - 2022)

Published: 17 January 2023 Publication History

Abstract

Critical Infrastructures (CIs) are vital for modern societies, covering different sectors like banking, emergency services, energy, healthcare, oil and gas, transportation, and water distribution. Over the years, CIs rely on technology for their seamless operations. Their reliable and secure operation is of supreme importance to societal welfare and a nation's economy. This paper reports on the presentation and discussions held during the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS - 2022). The main aim of this EnCyCriS workshop is to gather contributions from researchers and practitioners working on challenges and solutions for engineering and cybersecurity of critical systems in the Fourth Industrial Revolution (4IR). This year´s edition has accepted and presented seven papers in addition to a keynote speech from a Principal Analyst in Information Security for Equinor ASA, Norway. This workshop was co-located with the 44th International Conference on Software Engineering (ICSE - 2022), which took place on 16th May 2022.

References

[1]
B. Rathnayaka, C. Siriwardana, D. Robert, D. Amaratunga, and S. Setunge, "Improving the resilience of critical infrastructure: Evidence-based insights from a systematic literature review," International Journal of Disaster Risk Reduction, p. 103123, 2022.
[2]
R. Osei-Kyei, L. M. Almeida, G. Ampratwum, and V. Tam, "Systematic review of critical infrastructure resilience indicators," Construction Innovation, no. ahead-of-print, 2022.
[3]
A. H. K. Babar and Y. Ali, "Framework construction for augmentation of resilience in critical infrastructure: Developing countries a case in point," Technology in Society, vol. 68, p. 101809, 2022.
[4]
E. M. Wells, M. Boden, I. Tseytlin, and I. Linkov, "Modeling critical infrastructure resilience under compounding threats: a systematic literature review," Progress in Disaster Science, p. 100244, 2022.
[5]
N. Chowdhury and V. Gkioulos, "Cyber security training for critical infrastructure protection: A literature review," Computer Science Review, vol. 40, p. 100361, 2021.
[6]
S. Kim, G. Heo, E. Zio, J. Shin, and J.-g. Song, "Cyber attack taxonomy for digital environment in nuclear power plants," Nuclear Engineering and Technology, vol. 52, no. 5, pp. 995- 1001, 2020.
[7]
A. A. Süzen, "A Risk-Assessment of Cyber Attacks and Defense Strategies in Industry 4.0 Ecosystem," International Journal of Computer Network & Information Security, vol. 12, no. 1, 2020.
[8]
S. L. Pfleeger, M. A. Sasse, and A. Furnham, "From weakest link to security hero: Transforming staff security behavior," Journal of Homeland Security and Emergency Management, vol. 11, no. 4, pp. 489--510, 2014.
[9]
"Verizon, "2021 Data Breach Investigations Report"." https://www.verizon.com/business/resources/reports/dbir/
[10]
B. Z. Téglásy, S. Katsikas, and M. A. Lundteigen, "Standardized Cyber Security Risk Assessment for Unmanned Offshore Facilities," in 2022 IEEE/ACM 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS), 2022: IEEE, pp. 33--40.
[11]
A. van den Berghe, K. Yskout, and W. Joosen, "A Reimagined Catalogue of Software Security Patterns," in 2022 IEEE/ACM 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS), 2022: IEEE, pp. 25--32.
[12]
F. Sechi, B. A. Gran, P.-A. J"rgensen, and O. Kilyukh, "Better Security Assessment Communication: Combining ISO 27002 Controls with UML Sequence Diagrams," in 2022 IEEE/ACM 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS), 2022: IEEE, pp. 49--56.
[13]
P.-A. J"rgensen, A. Waltoft-Olsen, S. H. Houmb, A. L. Toppe, T. G. Soltvedt, and H. K. Muggerud, "Building a Hardware-inthe- Loop (HiL) Digital Energy Station Infrastructure for Cyber Operation Resiliency Testing," in 2022 IEEE/ACM 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS), 2022: IEEE, pp. 9--16.
[14]
A. Okutan and M. Mirakhorli, "Predicting the Severity and Exploitability of Vulnerability Reports using Convolutional Neural Nets," in 2022 IEEE/ACM 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS), 2022: IEEE, pp. 1--8.
[15]
S. Verreydt, L. Sion, K. Yskout, and W. Joosen, "Relationship- Based Threat Modeling," in 2022 IEEE/ACM 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS), 2022: IEEE, pp. 41--48.
[16]
A. Moiz and M. H. Alalfi, "A Survey of Security Vulnerabilities in Android Automotive Apps," in 2022 IEEE/ACM 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS), 2022: IEEE, pp. 17--24.

Cited By

View all
  • (2024)Digital Twins in Critical InfrastructureInformation10.3390/info1508045415:8(454)Online publication date: 1-Aug-2024
  • (2023)Towards a DevSecOps-Enabled Framework for Risk Management of Critical InfrastructuresSystems, Software and Services Process Improvement10.1007/978-3-031-42307-9_4(47-58)Online publication date: 30-Aug-2023

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGSOFT Software Engineering Notes
ACM SIGSOFT Software Engineering Notes  Volume 48, Issue 1
January 2023
113 pages
ISSN:0163-5948
DOI:10.1145/3573074
Issue’s Table of Contents
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 January 2023
Published in SIGSOFT Volume 48, Issue 1

Check for updates

Author Tags

  1. critical infrastructures
  2. cybersecurity
  3. safety
  4. software engineering
  5. systems engineering

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)27
  • Downloads (Last 6 weeks)3
Reflects downloads up to 23 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Digital Twins in Critical InfrastructureInformation10.3390/info1508045415:8(454)Online publication date: 1-Aug-2024
  • (2023)Towards a DevSecOps-Enabled Framework for Risk Management of Critical InfrastructuresSystems, Software and Services Process Improvement10.1007/978-3-031-42307-9_4(47-58)Online publication date: 30-Aug-2023

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media