ReSA4CI 2015

2nd International Workshop on Reliability and Security Aspects for Critical Infrastructure Protection

Critical infrastructures (CIs) are at the hearth of any advanced civilized country. These infrastructures include among others: finance and insurance, transportation (e.g. mass transit, rails and aircrafts), public services (e.g., law enforcement, fire and emergency), energy, health care. Hence, their destruction or disruption, even partially, may, directly or indirectly, strongly affect the normal and efficient functioning of a country. The global scope and massive scale of today’s attacks necessitate global situational awareness, which cannot be achieved by the isolated local protection systems residing within the IT bound- aries of individual institutions. This leads to foster the investigation of innovative methodologies for gathering, processing and correlating huge amounts of data understanding anomaly behaviours and learning automatically always-evolving cyber threats with the final aim to prevent and/or mitigate their consequences.

This workshop aims at providing a forum for researchers and engineers in academia and industry to foster an exchange of research results, experiences, and products in the area of reliable, dependable and secure computing for critical systems protection from both a theoretical and practical perspective. Its ultimate goal is to envision new trends and ideas about aspects of designing, implementing, and evaluating reliable and secure solutions for the next generation critical infrastructures. Critical Infrastructures present several challenges in the fields of distributed systems, dependability and security methods and approaches crucial for improving trustworthiness on ICT facilities. The workshop aims at presenting the advancement on the state of art in these fields and spreading their adoption in several scenarios involving main infrastructures for modern society.

Topics of interest are (but not limited to):

  • Model-based and experimental assessment of safety, reliability and security
  • Security & Privacy
  • Quantitative analysis of dependability and security metrics
  • Risk Assessment and Management
  • Fault tolerant and Dependable Distributed Algorithm
  • Threat Analysis
  • Monitoring systems
  • Adaptive solutions for secure and safe systems
  • Self-* solutions

Domains of application are (but not limited to):

  • Critical infrastructures, Smart Grid, and SCADA systems
  • Medical devices and healthcare
  • Telecommunication and networks
  • Railways, automotive, aerospace, and avionics
  • Defense, cyber intelligence

Rationale

Critical infrastructures (CIs) are at the hearth of any advanced civilized country. These infrastructures include among others: finance and insurance, transportation (e.g. mass transit, rails and aircrafts), public services (e.g., law enforcement, fire and emergency), energy, health care. Hence, their destruction or disruption, even partially, may, directly or indirectly, strongly affect the normal and efficient functioning of a country. The global scope and massive scale of today’s attacks necessitate global situational awareness, which cannot be achieved by the isolated local protection systems residing within the IT bound- aries of individual institutions. This leads to foster the investigation of innovative methodologies for gathering, processing and correlating huge amounts of data understanding anomaly behaviours and learning automatically always-evolving cyber threats with the final aim to prevent and/or mitigate their consequences. This investigation is currently carried out through several initiatives and project activities. Among others, the organizer of the proposed workshop are involved in the TENACE PRIN Project (n. 20103P34XC) funded by the Italian Ministry of Education, University and Research (in which we are in- volved) that aims to study the degree of maturity of the Italian critical infrastructures in order to provide solutions to protect them.

A workshop on reliability and security aspects in the general domain of CI is motivated by the unsuitability of current approaches due to the novel challenges imposed by always smart and powerful adversaries. In fact, several works exist in the literature about these research themes. However, existing solutions are usually applied to specific and closed system making them not general enough to be extended to other types of CI. The innovative and challenging aspect is to define new protection strategies in the context of complex, evolvable, and extremely heterogeneous systems and with respect to always evolving adversaries.

Submission Guidelines

  • All papers (up to 10 pages) must be original work not published before or in submission elsewhere. All papers should be submitted only in PDF.
  • Papers will be peer-reviewedby at least three reviewers, and accepted papers will be published in the SAFECOMP 2015 Workshop proceedings published by Springer in the LNCS series.
  • For paper submission the LNCS formatting rules apply, see Authors Guidelines.
  • Papers must be submitted using the EasyChair access for SAFECOMP 2015.

The PDF version of the Call for Papers for the workshop can be downloaded here.

Workshop Organizers

Silvia Bonomi, Universitá degli Studi di Roma ”La Sapienza”, Roma, Italy
Ilaria Matteucci, Consiglio Nazionale delle Ricerche (IIT-CNR), Pisa, Italy

Programme Committee

Valentina Bonfiglio, University of Florence, IT
Francois Bonnet, Japan Advanced Institute of Science and Technology, JP
Andrea Ceccarelli, University of Florence, IT
Michele Colajanni, Univerity of Modena and Reggio Emilia, IT
Barbara Gallina, Malardalen University, SE
Joaquin Garcia-Alfaro, Institut Mines-Telecom, FR
Felicita Di Giandomenico, ISTI-CNR, IT
Karama Kanoun, LAAS, FR
Paolo Masci, Queen Mary University of London, UK
Federica Paci, University of Southampton, UK
Marinella Petrocchi, IIT-CNR, IT
Marco Platania, Johns Hopkins University, USA

Important dates

Paper submission: May 29, 2015 [extended deadline!]
Author notification: June 15, 2015
Camera-ready Papers: June 28, 2015

Workshop: September 22, 2015

Programme ReSA4CI 2015 workshop

  • ReSA4CI 2015 Workshop (Programme)