
ICSS ’22, December 6, 2022, Austin, TX, USA Jacqueline Meyer and Giovanni Apruzzese
Our Contribution.
This paper bridges the gap between re-
search and practice in the SG context, with the intention of improv-
ing the cybersecurity of real SG systems. To reach our objective, we
begin by summarizing the limitations of existing literature from a
‘practical’ viewpoint (§2). Then, we make three major contributions.
•
We conduct an extensive survey with real practitioners in-
volved in the SG’s cybersecurity (§3). Our survey elucidates
the viewpoint of 18 entities, spanning across all seven do-
mains of the SG, and operating in diverse countries in Europe.
Our questions cover generic cybersecurity aspects, e.g.: risk
assessment, dangerous threats, utility of recent technologies.
•
After transparently presenting our major ndings (§4), we
perform an objective analysis highlighting the disconnections
that emerge from our survey (§5). We show: the discrepancy
between research and practice (§5.1); and the dierences
between the public and private sector (§5.2).
•
We then provide an original interpretation of our results (§6).
We explain the role of regulations in operational cyberse-
curity (§6.1); and derive takeaways for the four ‘spheres’
contributing to the cybersecurity of the SG (§6.2): compa-
nies, legislative bodies, researchers, and authorities.
To the best of our knowledge, this is the rst paper that provides
such an holistic coverage of ‘practical’ cybersecurity in the Euro-
pean SG in the recent years.
2 MOTIVATION AND RELATED WORK
Many papers investigated various cybersecurity aspects of the SG.
We identify four categories of related works: novel attacks and
defenses,literature reviews,case studies, and interviews. Let us explain
the necessity of our study by comparing our paper with prior work.
Attacks and Defenses.
Proposing novel attack scenarios, as
well as corresponding countermeasures, is common in research.
Yet, all such evaluations are performed through simulations, and
therefore have poor practical value. For instance, Zuo et al. [
63
]
propose unbounded attacks on microgrids: despite being rooted on
sophisticated mathematical foundations, the assessment is carried
out in a hardware-in-a-loop testbed. Rrushi et al. [
47
] propose a
physics-driven approach to counter CPS malware: although the
reference data is collected from real substations, the experiments
are carried out in a synthetic environment. A similar issue also
aects other attacks, such as False Data Injection (FDI) [
17
,
36
,
60
], Denial of Service (DoS) [
29
,
38
], spoong [
15
], or Man-in-the-
Middle (MitM) [
59
]. Put simply: no system is foolproof, and it is
positive that research papers also investigate similar scenarios.
However, practitioners have limited resources: according to the
cyber-resilience best practices [
16
,
42
], such resources should be
spent on threats that are more likely to endanger the real SG (which
cannot be gauged through ‘attack/defense’ papers).
Reviews.
Most reviews are exclusively based on scientic papers.
For instance, Awad et al. [
8
] focus on techniques for digital forensics
in SCADA systems, and although they cover frameworks, method-
ologies, and implementations, all such considerations are based on
past scientic literature. Furthermore, Peng et al. [
44
] provide an
in-depth analysis and identify some cybersecurity challenges in the
SG, but their main focus is on specic threats (e.g., DoS and FDI),
preventing a holistic coverage. Such limited scope is addressed, e.g.,
by El et al. [
21
], which also provide actionable recommendations.
However, all ndings of [
21
,
44
] are purely theoretical or derived
from prior research, overlooking the insight of practitioners.
Case Studies.
Many papers provide exhaustive analyses on real
APT targeting the SG. For instance, the authors of [
3
] considers
the evolutions of the original Stuxnet, while Case et al. [
13
] focus
on the Ukrainian SG. A more recent overview of reported APT is
provided by Kaura et al. [
27
]. These papers are useful to provide
some practical takeaways; however, they focus on attacks launched
many years prior, and do not allow to assess the current state-of-
the-art of cybersecurity in the SG.
Interviews.
Few works directly interviewed practitioners, and es-
pecially those related to the SG. For instance, Fischer et al. [
22
]
focus on general cybersecurity challenges in critical infrastructures.
Despite providing insights derived from 63 stakeholders, such ex-
perts pertain to dierent contexts (e.g., Smart Cities) than the SG.
Some papers report ‘outdated’ ndings—e.g., Line et al. [
37
] carry
out 19 interviews, but in in 2012. Nonetheless, Siemens et al. [
50
]
conduct a “workshop” in 2021 entailing participants (23 in total)
from industry and academia, there is no information about the
composition of these two groups, preventing to distill meaningful
knowledge of the practitioners’ viewpoints. Perhaps the closest
eort to our paper is [
45
], which focuses on the perspective of 10
organizations in the power industry. However, their ndings only
span across a single country (the US), and only focus on information
sharing—preventing a broad coverage of the topic.
Research Gap.
Existing works do not provide a holistic
vision of the current cybersecurity in the SG from the
perspective of practitioners. Our paper aims to x this gap
by elucidating the recent opinion of SG experts (operating
in diverse countries in Europe) to the research domain.
3 RESEARCH METHODOLOGY
The main contribution of this paper are the ndings of our survey
with 18 entities related to the SG. Our ndings, and corresponding
survey, revolve around a broad research objective: investigating the
state-of-the-practice of cybersecurity in the European SG.
In what follows, we describe our research methodology—for
which we provide an overview in Fig. 2. At the end of this section,
we make some considerations on our study and elucidate some of
the challenges we encountered (§3.3).
Preliminary Investigation
1) Identification of SG entities
in European countries
2) First contact with
Private Companies
3) First contact with
Public Authorities
1) Identification of relevant
topics for our objective
2) Designing the questionnaire
for Private Companies
3) Designing the questionnaire
for Public Authorities
1) Data collection, translation,
aggregation and visualization
2) Objective and transparent
analysis of responses
3) Original interpretation
of results and takeaways
Interview
Agreements
(NDA)
Live
Interviews
(remote)
Fig. 2: Overview of our adopted research methodology.
3.1 Preliminary Investigation
We began our study by identifying a suitable set of entities that
(i) allowed to address our main objective and that (ii) were willing to
contribute to our research. Let us briey summarize the complexity
of the modern SG, so as to enable understanding why reaching our
objective is dicult for research endeavours.
2