MOBILESoft 2022
Tue 17 - Wed 18 May 2022
co-located with ICSE 2022
VenueMidspace
Room nameEnCyCris room
Room InformationNo extra information available

Information for Participants
Info for room EnCyCris room:

Click here to go to the room on Midspace

Program

You're viewing the program in a time zone which is different from your device's time zone - change time zone

Mon 16 May

Displayed time zone: Eastern Time (US & Canada) change

03:30 - 04:00
Test connectionEnCyCriS at EnCyCris room
04:00 - 04:45
Welcome to EnCyCriS 2022: Introduction and KeynoteEnCyCriS at EnCyCris room
Chair(s): John Eidar Simensen IFE
04:00
45m
Keynote
Keynote: "The challenges of gaining insights into highly critical systems."
EnCyCriS

04:45 - 06:15
Session 1 - Security patterns and Critical InfrastructuresEnCyCriS at EnCyCris room
04:45
22m
Talk
Standardized Cyber Security Risk Assessment for Unmanned Offshore Facilities
EnCyCriS
Balint Teglasy NTNU, Sokratis Katsikas Norwegian University of Science and Technology (NTNU), Mary Ann Lundteigen NTNU
05:07
22m
Talk
A Reimagined Catalogue of Software Security Patterns
EnCyCriS
Alexander van den Berghe imec-DistriNet, KU Leuven, Koen Yskout imec - DistriNet, KU Leuven, Wouter Joosen imec-DistriNet, KU Leuven
05:30
22m
Talk
Better Security Assessment Communication: Combining ISO 27002 Controls with UML Sequence Diagrams
EnCyCriS
Fabien Sechi Institute for Energy Technology, Bjørn Axel Gran Institute for Energy Technology (IFE), Per-Arne Jørgensen Institute for Energy Technology, Oleh Kyliukh Rivne Nuclear Power Plant
05:52
22m
Talk
Building a Hardware-In-the-Loop (HIL) Digital Energy Station Infrastructure for Cyber Operation Resiliency Testing.
EnCyCriS
Per-Arne Jørgensen Institute for Energy Technology, André Waltoft-Olsen NTNU, Siv Hilde Houmb Statnett SF, Aleksander Lygren Toppe Institute for Energy Technology, Tore Soltvedt Statnett SF, Hans Kristian Muggerud Siemens AS
06:15 - 06:30
06:30 - 07:10
Session 1 Q&AEnCyCriS at EnCyCris room
06:30
40m
Live Q&A
Session 1 Q&A - Security Pattern and Critical Infrastructure
EnCyCriS

07:10 - 08:20
Session 2 - Threat and Vulnerabilities AnalysisEnCyCriS at EnCyCris room
07:10
23m
Talk
Predicting the Severity and Exploitability of Vulnerability Reports using Convolutional Neural Nets
EnCyCriS
Ahmet Okutan Rochester Institute of Technology, Mehdi Mirakhorli Rochester Institute of Technology
07:33
23m
Talk
Relationship-Based Threat Modeling
EnCyCriS
Stef Verreydt imec-DistriNet, KU Leuven, Laurens Sion imec-DistriNet, KU Leuven, Koen Yskout imec - DistriNet, KU Leuven, Wouter Joosen imec-DistriNet, KU Leuven
07:56
23m
Talk
A Survey of Security Vulnerabilities in Android Automotive Apps
EnCyCriS
Manar H. Alalfi Ryerson University, Abdul Moiz Ryerson University
08:20 - 08:30
08:30 - 09:00
Session 2 Q&AEnCyCriS at EnCyCris room
08:30
30m
Live Q&A
Session 2 Q&A - Threat and Vulnerabilities Analysis
EnCyCriS

09:00 - 09:10