2018 Workshop on Secure and Resilient Control Systems

57th IEEE Conference on Decision and Control, Miami Beach, FL, USA, December 17-19, 2018.


  • Hideaki Ishii, Department of Computer Science, School of Computing, Tokyo Institute of Technology, Yokohama, 226-8502, Japan
  • Quanyan Zhu, Department of Electrical and Computer Engineering, Tandon School of Engineering, New York University, 5 MetroTech Center, Brooklyn, NY, 11201


Modern control systems are characterized by tight integration of cyber (computation and communication) components with physical systems.  This paradigm is expected to transform critical sectors of society including energy, health care, and transportation. The integration of cyber systems, however, creates new entry points for cyber attacks, which degrade the availability of the physical system, disrupt the communication protocols needed for coordinated control, and compromise the safety and performance of physical components.

Security of control systems poses an inherently multi-disciplinary research challenge.  Network and systems security is needed to discover possible cyber vulnerabilities and develop secure protocols.  The incentives, capabilities, and goals of adversary must be understood and modeled, through techniques including game theory.  The control actions should be robust to the impact of possible attacks and enable recovery of system functionality when attacks do occur. The proposed workshop will present a holistic view of control system security, with perspectives on network security, game theory, and control, as well as a view for how these disciplines can be combined to design resilient, safe, and secure control systems.

From the application side, we will place a particular emphasis on the security of power systems, which is one of the most active research domains in this area. Case studies on different control and regulation operations in energy management systems as well as the development of testbeds for the cyber-physical security of such systems will be presented.

We plan to have nine presentations given by leading experts who have recently worked on the subject with different backgrounds including control theory, game theory, network security, and power systems. We also intend to include a short session by a representative of NSF who will provide a perspective from the funding agency on security related issues.


  • Anuradha Annaswamy and Mehran Dibaji (MIT)
  • Tamer Basar (UIUC)
  • Henrik Sandberg and Karl H. Johansson (KTH)
  • Zhihua Qu (UCF)
  • Joao Hespanha (UCSB) and Yongqiang Wang (Clemson U)
  • Radha Poovendran (U of Washington)
  • Manimaran Govindarasu (Iowa State U)
  • Radhakisan Baheti (NSF)
  • Hideaki Ishii (Tokyo Institute of Technology)
  • Quanyan Zhu (New York University)

Tentative Schedule

9:00-9:10am:            Opening remarks (Organizers)
9:10-9:50am:            Tamer Basar (UIUC)
9:50-10:30am:          Anuradha Annaswamy and Mehran Dibaji (MIT)
10:30-10:45am:        Morning coffee break
10:45-11:25am:        Joao Hespanha (UCSB) and Yongqiang Wang (Clemson U)
11:25-12:05pm:        Radha Poovendran (U of Washington)

12:05-1:30pm:           Lunch

1:30-2:10pm:            Manimaran Govindarasu (Iowa State U)
2:10-2:50pm:            Hideaki Ishii (Tokyo Tech)
2:50-3:30pm:            Zhihua Qu (UCF)
3:30-3:45pm:            Afternoon coffee break
3:45-4:25pm:            Henrik Sandberg and Karl H. Johansson (KTH)
4:25-5:05pm:            Quanyan Zhu (NYU)
5:05-5:25pm:            TBA
5:25-5:35pm:            Closing remarks (Organizers)