
tremely useful) how you would rate the usefulness
of the infrastructures provided at the hackathon?”.
In general, the mean index MD of the satisfaction
rate was high, with the exception of the hydroelectric
model as this part has not been used by many par-
ticipants. Note that we have employed an additional
standalone Siemens Siprotec device in the hackathon,
which is not part of the regular setup.
Another result of the hackathon was the discovery
and reporting following a responsible disclosure pro-
cess of three vulnerabilities (CVE-2022-4778, CVE-
2022-4779, CVE-2022-4780), which were discovered
through analysis of the Gateway Applicance and its
firmware. CVE-2022-4778 concerns a path traver-
sal vulnerability in the gateway that allows authen-
ticated users to get unauthorized access to files on the
server’s filesystem. CVE-2022-4780 concerns hard-
coded crendentials in the gateway. The identified vul-
nerabilities show that the use of state-of-the-art hard-
ware for cyber security research is essential because
it provides a more realistic and accurate representa-
tion of the actual devices and systems being targeted
by potential cyber attacks, unlike simulated devices
which may not accurately reflect real-world scenarios
and vulnerabilities.
An additional result of the hackathons was a test
suite for IDS in substation environments developed by
the defense team. The authors plan to report about it
in a separate paper.
6 SUMMARY AND CONCLUSION
We have presented the design and use of a lab dedi-
cated to cyber security in critical infrastructures that
models a hydroelectric power plant to produce energy
and a substation automation system to transfer it. The
lab is unique in its double use for both teaching and
research purposes. The lab features a combination
of old and new devices and systems to cater to both
basic and advanced research and teaching needs, en-
abling hackathons with a broad audience. Going for-
ward, we will focus on the integration of additional
critical infrastructure components, e.g., for building
automation, to enable an even more holistic research
and learning experience.
REFERENCES
Barrett, M. (2018). Framework for improving critical in-
frastructure cybersecurity version 1.1.
Candell, R., Zimmerman, T., and Stouffer, K. (2015). An
industrial control system cybersecurity performance
testbed. National Institute of Standards and Technol-
ogy. NISTIR, 8089.
Chowdhury, N. and Gkioulos, V. (2021). Cyber security
training for critical infrastructure protection: A litera-
ture review. Computer Science Review, 40:100361.
Frank, M., Leitner, M., and Pahi, T. (2017). Design con-
siderations for cyber security testbeds: A case study
on a cyber security testbed for education. In 2017
IEEE 15th Intl Conf on Dependable, Autonomic and
Secure Computing, 15th Intl Conf on Pervasive Intel-
ligence and Computing, 3rd Intl Conf on Big Data
Intelligence and Computing and Cyber Science and
Technology, pages 38–46.
Gunathilaka, P., Mashima, D., and Chen, B. (2016). Soft-
grid: A software-based smart grid testbed for evaluat-
ing substation cybersecurity solutions. In Proceedings
of the 2nd ACM Workshop on Cyber-Physical Systems
Security and Privacy, CPS-SPC ’16, page 113–124,
New York, NY, USA. Association for Computing Ma-
chinery.
Holm, H., Karresand, M., Vidstr
¨
om, A., and Westring, E.
(2015). A survey of industrial control system testbeds.
In Buchegger, S. and Dam, M., editors, Secure IT Sys-
tems, Lecture Notes in Computer Science, pages 11–
26. Springer International Publishing.
Obermeier, S., J
¨
osler, T., Renggli, S., Untern
¨
ahrer, M., and
H
¨
ammerli, B. M. (2023). Automating recovery in
mixed operation technology/it critical infrastructures.
IEEE Secur. Priv., 21(5):43–54.
Ruhe, S. and Roesch, D. (2019). Design of a cyber-physical
energy laboratory. In International ETG-Congress
2019; ETG Symposium, pages 1–6.
R
¨
osch, D., Bartusiak, A., and Ruhe, S. (2020). Portable cy-
bersecurity training and research platform for power
grids - testbed report. In The 15th International Con-
ference on Critical Information Infrastructures Secu-
rity 2020 (CRITIS), 2-3 September 2020, Bristol, UK.
Sauer, F., Niedermaier, M., Kießling, S., and Merli, D.
(2019). LICSTER - A low-cost ICS security testbed
for education and research. CoRR, abs/1910.00303.
Yang, Y., Jiang, H. T., McLaughlin, K., Gao, L., Yuan,
Y., Huang, W., and Sezer, S. (2015). Cybersecurity
test-bed for iec 61850 based smart substations. In
2015 IEEE Power & Energy Society General Meeting,
pages 1–5.
HydroLab: A Versatile Hydroelectric Power Lab for Security Research and Education
627