2019 Archive


Summit Presentations

World Class

Recent Changes

  • 23 September 2019Erwin Paternotte & Mattijs van Ommeren will not be presenting their "It WISN't Me: Attacking Industrial Wireless Mesh Networks (part II)" due to other pressing obligations.
  • 17 October 2019Prasanna N will not be presenting their "CVSS for ICS; Gauging a tennis game with number of goals".

The fall of CODESYS

Alexander Nochvay

Applying the Consequence-driven Cyber-informed Engineering method on a Facility for a Successful Attack

Andreas Erdich Jens Wiesner


Sandworm: Lessons From the Ukrainian Cyberwar and Beyond

Andy Greenberg

What is the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE)?

Cdr Michael Widmann

Tales from Industrial Plants and Responders.

Christian Augustat Mona Lange

Automotive DoIP and forensic analysis for automotive systems

Christopher Corbett Kevin Gomez Buquerin

curl - the world's most used software component?

Daniel Stenberg

EU STRIKE3 project

Didrik Ehrenborg

Security Testing for ICS Owners 2.0

Dieter Sarrazyn

TLS Interception and Decryption *LIVE DEMO*

Erik Hjelmvik

A view from the Blue side of Locked Shields

Erik Biverot Johan Nilsson

Introduction to Malcolm

Janek Pelzer

Presenting how we know what’s happening in the exercise and measuring

Jarkko Huttunen

Broken Rungs: A look at popular ladder logic runtime privileges

Jimmy Wylie Reid Wightman

Digital Forensics and ICS: Why and how?

Jonathan Jogenfors

Secure your MES - the bridge between IT and OT

Khalid Ansari

IT vs. OT: We are Much More Similar than We are Different. Comparing Process Control Room and SOC operations

Marina Krotofil

Fuzz Testing IEC 61850

Markus Mahrla

Project RunAway

Matan Dobrushin Yoav Flint Rosenfeld

When will my PLC support Mirai? The security economics of large-scale attacks against ICS

Mike Dodson

Nation-State Supply Chain Attacks for Dummies and You Too

Monta Elkins

SCADApocalypse Now 4.0?

Nicklas Keijser

Building a distributed and robust time synchronisation service

Ragnar Sundblad

Demystifying TSCM or how to spot the witch doctor doing the raindance

Richard Widh

Ultra responsible disclosure – or how to deal with a 0-day in critical infrastructure

Rikard Bodforss

Red Teams view from the exercise

Sandra Bardón

Layered Blueprints – an ontology and method for (talking about) engineering OT Security

Sarah Fluchs

Digging into the technical setup of the exercise

Silver Saks

How we reverse-engineered multiple industrial radio remote-control systems

Stephen Hilt

Introduction to Locked Shields exercise

Thomas Svensson


The cyber-attack on Hydro

Torstein Gimnes Are

Memory Forensics and DMA Attacks with MemProcFS and PCILeech

Ulf Frisk