RITICS Fest 2025
The Research Institute in Trustworthy Inter-Connected Cyber-Physical Systems (RITICS) was thrilled to announce the launch of an annual workshop series. The event offers a unique platform to showcase and discuss the latest advancements in the security of Industrial Control and Cyber-Physical Systems across the UK.
Presentation Summaries
Operational technology (OT) bridges the physical and cyber worlds in critical sectors. It is natural, therefore, that asset owners seek assurance of their OT security. A common approach to IT security assurance is penetration testing, which intends to emulate the tactics, techniques, and procedures (TTPs) of real adversaries. However, like many OT security capabilities, penetration testing doesn’t translate directly from IT.
Cyber-resilience and the UK’s Security Strategy. The team at Innovate UK will present the latest funding opportunities and support available to researchers, startups and spinouts enabled by the 2025 Industrial Strategy and National Security Strategy. We will cover the current programmes like DSBD, CyberLocal and CyberASAP as well as the new programs that will be delivered by Innovate UK and UKRI. This may include early access to future competitions and forthcoming programmes from ourselves and DSIT.
The Cyber Innovation Hub (Cardiff University) is developing cutting-edge operational technology (OT) cyber security test beds and training programmes to build practical skills and national resilience. Our test bed environments such as Fieldsite-in-a-Box, Purdue Wall, and Sensor-in-a-Box enable safe, realistic simulation of cyber-physical attacks on infrastructure including energy, water, and transport systems. These environments support red/blue team exercises, virtual and physical escape rooms, and sector-specific digital twins. Training is delivered through CPD-certified, modular courses across all levels covering topics from OT fundamentals to advanced incident response and leadership. All content aligns with industry standards like IEC 62443, ISO 27001, and NIST. This talk will present the test bed capabilities, course design approach, and outcomes from industry collaboration highlighting a scalable model for cyber-physical security education and research.
The idea behind this talk is to provide some insight into the kind of issues we encounter when we apply static analysis tools to the software component of safety-critical systems that have already been certified to a high level of safety integrity. For example, for a SIL 2 system in continuous operation, the probability of a dangerous failure per hour is expected to be between 10-6 and 10-7. One hundred years is 438,300 hours, so this corresponds to a roughly 50% chance of failure every 100 years. Bugs that only occur every 100 years are unlikely to be found during testing, so more formal methods of analysis are required.
Static analysis is a method of analysing the behaviour of a program from its source code, without actually running the program. Modern static analysers use a technique called abstract interpretation to compute the effect of each statement on the range of possible values that program variables can hold. The use of static analysis tools is now mandatory in some industrial sectors and we would expect safety-critical software to have been subjected to static analysis during its development. However, it is well known that different static analysers can produce different results, in part because of different trade-offs between accuracy and precision.
Our experience is with two tools from MathWorks called Polyspace Bug Finder and Polyspace Code prover. Both use abstract interpretation but make different trade-offs. Bug Finder checks for over 300 defects and is designed to be fast with few false positives. Code Prover checks for 30 critical run-time errors and aims to prove their absence with zero false negatives. Both tools typically produce a large number of findings that need to be reviewed manually and sentenced – the process is analogous to looking for a needle in a haystack, and the purpose of this talk is to describe some of the needles we have found and perhaps encourage researchers to devise better ways of finding such needles.
Formally verified OSes have been “the future†for over 15 years, so why haven’t they been adopted more? In this talk we will explore some of the history of microkernels, RTOSes, and software platform security for ICS/CPS, both verified and un-verified. We will outline some of the key challenges we have encountered through engagements with energy suppliers and healthcare providers, and what we see as the barriers to adoption.
The context of ICS/CPS development and their certification / accreditation requirements often create challenges and restrictions not encountered elsewhere. There are many good reasons why developers can’t just add random, untrusted code to critical systems (!), but what if we could? How could we become comfortable with that — and convince an accreditor — that our untrusted code cannot negatively impact a system’s security and safety-critical functionality? To have any chance of achieving this we need cast-iron guarantees of both separation and controlled information flow, and realistically we can’t build this without provable security (i.e., formal verification). Unfortunately, this isn’t the whole story: we have the high-level safety and security claims (e.g., “the system is secureâ€, “the system operates safelyâ€), and our low-level proven guarantees of isolation from the OS, but making the link between these two is often less well fleshed out than we would like, or than is required by an accreditor.
We want to enable people without a background in formal methods to build real systems that take advantage of strong isolation, and which can demonstrate the link between automated proofs for an underlying microkernel, and the high-level safety case. We believe that taking advantage of this isolation will reduce the self-censorship (inadvertently) caused by certification bodies, and spur innovation in both academia and industry, while still being able to make the required security and safety cases. This talk will explore how far we’ve come, what has worked well, and what we see as the remaining challenges.
RITICS topics relating to this submission:
– Software Security in ICS/CPS specific environments.
– Design, Operation and Analysis of Systems for both Security and Safety.
– Assurance for both security and safety in ICS/CPS including the application of formal methods to CPS.
– Retrofitting Security to legacy systems.
– Resilience of ICS/CPS to adversarial attacks including system recovery and adaptation.
Unmanned Aerial Vehicles (UAVs) are increasingly deployed across critical sectors, yet remain vulnerable to GPS spoofing attacks that can compromise safety, control, and mission integrity. This presentation brings together two complementary studies addressing both offensive and defensive dimensions of GPS spoofing in UAVs. The first investigates a novel time-based GPS spoofing attack that manipulates MAVLink 2.0’s timestamp synchronisation protocol without requiring key recovery, enabling precise clock manipulation, replay attacks, and potential denial-of-service via timestamp overflow. Simulation and hardware-in-the-loop testing confirm the attack’s feasibility and highlight systemic vulnerabilities in constrained UAV communication protocols. The second study introduces a deep learning-based defence mechanism using a BiLSTM-Attention-CNN model, trained solely on GPS sensor data, to detect spoofed signals in real time. Implemented within a modified PX4-JMAVSim environment, the model outperforms traditional ML and DL approaches, demonstrating high precision and recall even under imbalanced data conditions. Together, these works expose critical attack vectors in civilian UAV systems and propose scalable, resource-aware mitigation strategies suited to real-world deployments.
This presentation aligns closely with RITICS FEST’s focus on advancing the cybersecurity of Industrial Control and Cyber-Physical Systems (ICS/CPS). UAVs represent a rapidly growing class of autonomous CPS deployed in sectors such as transport, infrastructure monitoring, and emergency response. The research addresses two key challenges: (1) the exploitation of protocol-level vulnerabilities through GPS-based timestamp spoofing in MAVLink 2.0, and (2) the development of a lightweight, AI-powered anomaly detection system to defend against such attacks. This work contributes to several key workshop themes, including threat intelligence, anomaly detection, AI applications in CPS security, and resilience to adversarial attacks. It also presents a novel simulation and test bed environment for GPS spoofing experimentation.
The second Bristol Industrial Control Systems Capture-the-flag (BrICS-CTF) was held on the 25th-27th June 2025. This event, funded by RITICS and the University of Bristol, is the only open entry CTF competitions with a focus on ICS in the UK. 42 participants over 11 teams from industry participated in the event. Participants first completed a half day of training on practical ICS hacking, followed by 2 days of the competition. In this talk, we will give an overview of the BrICS-CTF event and its outcomes. We will first briefly discuss our previous 2 events, the lessons learnt from those and how they influenced the design and organisation of the 2025 BrICS-CTF event. We will then talk about the 2025 event, including an overview of the systems and network, examples of challenges and a discussion of the results.
The presentation plans to introduce my research of a context-aware, AI-guided security framework tailored for Industrial Control and Cyber-Physical Systems. Existing approaches, largely adapted from enterprise IT, often treat data in isolation, rely on delayed analysis, and fail to reflect the operational urgency of ICS/CPS environments.These assumptions don’t hold in control environments that depend on real-time operation, safety, and tight coupling between digital and physical systems.
The increasing autonomy and connectivity of transport systems has transformed vehicles into complex cyber-physical systems (CPS) with dynamic operational demands and interdependent control logic. However, traditional cybersecurity methodologies—rooted in component-centric threat models and rigid assurance frameworks—struggle to accommodate the nonlinear variability, emergent behaviours, and socio-technical interdependencies inherent in Connected and Autonomous Vehicles (CAVs).
Modern cyber-physical systems (CPS), such as UAVs, next-generation fighter aircraft, and command-and-control (C2) platforms, integrate digital computation with physical processes to make mission-critical decisions in real time. These systems rely heavily on sensor data (e.g., GPS, pressure transducers, image processors), making them vulnerable to stealthy threats like False Data Injection (FDI) and sensor spoofing. These attacks manipulate input data while maintaining apparent operational normality, potentially leading to unsafe decisions without detection.
Under the pathway towards net-zero, the power system is undergoing rapid digitalisation to tackle the increasingly complex system dynamics resulting from the integration of inverter-based resources (IBRs). However, the cyber security posture of power systems is also escalating as evidenced by recent attack incidents such as the one hijacking hundreds of solar panels in Japan and growing number of Common Vulnerabilities and Exposures (CVEs) identified in renewable generation units. In parallel to the cyber security concern, the complicated and fast dynamics of newly integrated IBRs also pose potential risks to the power system stability, where the negative impedance characteristics exhibited by IBRs at lower frequency ranges can lead to sub-synchronous oscillations (SSO). A notable example demonstrating this was the August 2019 UK grid event, where insufficient damping of sub-synchronous oscillations within a wind farm, following a transmission system fault, directly contributed to a significant blackout event. Unlike traditional power grids driven by the physical behavior of synchronous machines, IBR-dominated grids depend on software-based control systems, increasing their exposure to cyber attacks. Despite emerging focus either on the cyber security enhancement or on the system stability assessment in renewable-dominated power systems, there still lacks research effort explicitly linking cyber security to system stability, which would be increasingly vital as cyber threats grow more sophisticated. Therefore, this paper aims to fill this research gap by demonstrating the cyber vulnerability and system impact of IBRs. Such vulnerability could be exploited through small-magnitude, difficult-to-detect triggering signals, leading to rapidly propagating oscillations across power systems, significantly compromising stability and potentially resulting in widespread blackouts.