Securing Critical Infrastructure: Challenges and Solutions

June 3rd, 2021

Date and Time: 26th May, 3 – 4 PM AEST (1 – 2 PM SGT).


Slides: 2021.05 Data61 — cybersecurity for CI

Guest Speaker: Professor Jianying Zhou, Singapore University of Technology and Design, Singapore.

Jianying Zhou is a professor and co-center director for iTrust at Singapore University of Technology and Design (SUTD). He received PhD in Information Security from Royal Holloway, University of London. His research interests are in applied cryptography and network security, cyber-physical system security, mobile and wireless security. He has published 250+ papers with 10,000+ citations, and received ESORICS’15 best paper award. He is a co-founder & steering committee co-chair of ACNS. He is also steering committee chair of ACM AsiaCCS, and steering committee member of Asiacrypt. He has served in ACM CCS & AsiaCCS, IEEE CSF, ESORICS, RAID, ACNS, Asiacrypt, FC, PKC etc. as general chair, program chair, or PC member. He has also been in the editorial board of IEEE Security & Privacy, IEEE TDSC, IEEE TIFS, Computers & Security etc. He received the ESORICS Outstanding Contribution Award in 2020, in recognition of contributions to the community.


Critical infrastructure becomes a strategic target in the midst of a cyber-war. Governments are investing significantly in response to the risks and challenges while researchers and vendors are aggressively developing and marketing new technologies aimed at protecting critical infrastructure. In this talk, I will briefly describe the framework and features of a cyber-physical system (CPS) which serves as the core to provide critical services in different industrial domains. Then I will discuss the challenges we face and the approaches we can take to defend against cyber attacks. After that I will present a few novel technologies developed in iTrust for preventing and detecting attacks to CPS. I will further introduce the fully operational CPS testbeds in iTrust, and show how the testbeds are used to validate the security technologies so that the owners and operators of critical infrastructure can be confident that the technologies to be deployed will actually protect their systems in the event of a cyber-war.