{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:24:44Z","timestamp":1743128684268,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030526825"},{"type":"electronic","value":"9783030526832"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-52683-2_3","type":"book-chapter","created":{"date-parts":[[2020,7,6]],"date-time":"2020-07-06T23:19:19Z","timestamp":1594077559000},"page":"44-64","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim\u2019s Perspective"],"prefix":"10.1007","author":[{"given":"Herson","family":"Esquivel-Vargas","sequence":"first","affiliation":[]},{"given":"Marco","family":"Caselli","sequence":"additional","affiliation":[]},{"given":"Geert Jan","family":"Laanstra","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Peter","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,7]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","unstructured":"Ahmed, C.M., Palleti, V.R., Mathur, A.P.: WADI: a water distribution testbed for research in the design of secure cyber physical systems. In: Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks, CySWATER@CPSWeek 2017, Pittsburgh, Pennsylvania, USA, 21 April 2017, pp. 25\u201328 (2017). \nhttps:\/\/doi.org\/10.1145\/3055366.3055375","DOI":"10.1145\/3055366.3055375"},{"key":"3_CR2","doi-asserted-by":"publisher","unstructured":"Almgren, M., et al.: RICS-el: building a national testbed for research and training on SCADA security (short paper). In: Critical Information Infrastructures Security - 13th International Conference, CRITIS 2018, Kaunas, Lithuania, 24\u201326 September 2018, Revised Selected Papers, pp. 219\u2013225 (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-030-05849-4_17","DOI":"10.1007\/978-3-030-05849-4_17"},{"key":"3_CR3","unstructured":"ANSI\/ASHRAE STANDARD 135\u20132016: A Data Communication Protocol for Building Automation and Control Networks (2016)"},{"key":"3_CR4","unstructured":"ANSI\/ASHRAE STANDARD 62.1-2016: Ventilation for Acceptable Indoor Air Quality (2016)"},{"key":"3_CR5","unstructured":"ANSI\/ASHRAE\/ASHE STANDARD 170\u20132017: Ventilation of Health Care Facilities (2017)"},{"key":"3_CR6","unstructured":"ANSI\/TIA: ANSI\/TIA-492-A Telecommunications Infrastructure Standard for Data Centers (2012)"},{"key":"3_CR7","unstructured":"ANSI\/TIA: ANSI\/TIA-569-C Telecommunications Pathways and Spaces (2012)"},{"key":"3_CR8","unstructured":"Bilefsky, D.: Hackers use new tactic at Austrian hotel: locking the doors. \nhttps:\/\/www.nytimes.com\/2017\/01\/30\/world\/europe\/hotel-austria-bitcoin-ransom.html\n\n. Accessed 22 Oct 2019"},{"key":"3_CR9","unstructured":"Candell, R., Stouffer, K., Anand, D.: A cybersecurity testbed for industrial control systems. In: Proceedings of the 2014 Process Control and Safety Symposium (2014)"},{"key":"3_CR10","unstructured":"Chipkin: The 18 Attack Types Using the Vulnerabilities of BACnet. \nhttps:\/\/store.chipkin.com\/articles\/the-18-attack-types-using-the-vulnerabilities-of-bacnet\n\n. Accessed 10 Sept 2019"},{"key":"3_CR11","doi-asserted-by":"publisher","unstructured":"Esquivel-Vargas, H., Caselli, M., Peter, A.: Automatic deployment of specification-based intrusion detection in the BACnet protocol. In: Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, Dallas, TX, USA, 3 November 2017, pp. 25\u201336 (2017). \nhttps:\/\/doi.org\/10.1145\/3140241.3140244","DOI":"10.1145\/3140241.3140244"},{"key":"3_CR12","doi-asserted-by":"publisher","unstructured":"Esquivel-Vargas, H., Caselli, M., Tews, E., Bucur, D., Peter, A.: BACRank: ranking building automation and control system components by business continuity impact. In: Computer Safety, Reliability, and Security - 38th International Conference, SAFECOMP 2019, Turku, Finland, 11\u201313 September 2019, Proceedings, pp. 183\u2013199 (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-26601-1_13","DOI":"10.1007\/978-3-030-26601-1_13"},{"key":"3_CR13","doi-asserted-by":"publisher","unstructured":"Fauri, D., Kapsalakis, M., dos Santos, D.R., Costante, E., den Hartog, J., Etalle, S.: Role inference + anomaly detection = situational awareness in BACnet networks. In: Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, 19\u201320 June 2019, Proceedings, pp. 461\u2013481 (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-22038-9_22","DOI":"10.1007\/978-3-030-22038-9_22"},{"key":"3_CR14","doi-asserted-by":"publisher","unstructured":"Hadziosmanovic, D., Sommer, R., Zambon, E., Hartel, P.H.: Through the eye of the PLC: semantic security monitoring for industrial processes. In: Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC 2014, New Orleans, LA, USA, 8\u201312 December 2014, pp. 126\u2013135 (2014). \nhttps:\/\/doi.org\/10.1145\/2664243.2664277","DOI":"10.1145\/2664243.2664277"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Holmberg, D., Evans, D.: BACnet wide area network security threat assessment. US Department of Commerce, National Institute of Standards and Technology (2003)","DOI":"10.6028\/NIST.IR.7009"},{"key":"3_CR16","unstructured":"HVACR control: Attack BACnet MSTP by frame desynchronization. \nhttp:\/\/www.hvacrcontrol.com\/attack-bacnet-mstp-by-frame-desynchronization\/\n\n. Accessed 13 Sept 2019"},{"key":"3_CR17","unstructured":"ISACA: Cybersecurity fundamentals glossary (2018). \nhttps:\/\/www.isaca.org\/Knowledge-Center\/Documents\/Glossary\/glossary.pdf"},{"key":"3_CR18","unstructured":"ISO 27031:2011: Information technology -Security techniques- Guidelines for information and communication technology readiness for business continuity (2011)"},{"key":"3_CR19","doi-asserted-by":"publisher","unstructured":"Kaur, J., Tonejc, J., Wendzel, S., Meier, M.: Securing BACnet\u2019s pitfalls. In: ICT Systems Security and Privacy Protection - 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, 26\u201328 May 2015, Proceedings, pp. 616\u2013629 (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-18467-8_41","DOI":"10.1007\/978-3-319-18467-8_41"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Kavallieratos, G., Katsikas, S.K., Gkioulos, V.: Towards a cyber-physical range. In: Proceedings of the 5th on Cyber-Physical System Security Workshop, pp. 25\u201334. ACM (2019)","DOI":"10.1145\/3327961.3329532"},{"key":"3_CR21","doi-asserted-by":"publisher","unstructured":"Kim, J., Kim, K., Jang, M.: Cyber-physical battlefield platform for large-scale cybersecurity exercises. In: 11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, 28\u201331 May 2019, pp. 1\u201319 (2019). \nhttps:\/\/doi.org\/10.23919\/CYCON.2019.8756901","DOI":"10.23919\/CYCON.2019.8756901"},{"key":"3_CR22","doi-asserted-by":"publisher","unstructured":"Lee, E.A.: Cyber physical systems: design challenges. In: 11th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2008), 5\u20137 May 2008, Orlando, Florida, USA, pp. 363\u2013369. IEEE Computer Society (2008). \nhttps:\/\/doi.org\/10.1109\/ISORC.2008.25","DOI":"10.1109\/ISORC.2008.25"},{"issue":"5","key":"3_CR23","doi-asserted-by":"publisher","first-page":"2444","DOI":"10.1109\/TSG.2015.2432013","volume":"6","author":"R Liu","year":"2015","unstructured":"Liu, R., Vellaithurai, C., Biswas, S.S., Gamage, T.T., Srivastava, A.K.: Analyzing the cyber-physical impact of cyber events on the power grid. IEEE Trans. Smart Grid 6(5), 2444\u20132453 (2015). \nhttps:\/\/doi.org\/10.1109\/TSG.2015.2432013","journal-title":"IEEE Trans. Smart Grid"},{"key":"3_CR24","unstructured":"Metropolitan.fi: DDoS attack halts heating in Finland amidst winter. \nhttps:\/\/metropolitan.fi\/entry\/ddos-attack-halts-heating-in-finland-amidst-winter\n\n. Accessed 22 Oct 2019"},{"key":"3_CR25","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.cose.2019.04.011","volume":"85","author":"Z Pan","year":"2019","unstructured":"Pan, Z., Hariri, S., Pacheco, J.: Context aware intrusion detection for building automation systems. Comput. Secur. 85, 181\u2013201 (2019). \nhttps:\/\/doi.org\/10.1016\/j.cose.2019.04.011","journal-title":"Comput. Secur."},{"key":"3_CR26","doi-asserted-by":"publisher","unstructured":"Peacock, M., Johnstone, M.N., Valli, C.: Security issues with BACnet value handling. In: Proceedings of the 3rd International Conference on Information Systems Security and Privacy, ICISSP 2017, Porto, Portugal, 19\u201321 February 2017, pp. 546\u2013552 (2017). \nhttps:\/\/doi.org\/10.5220\/0006263405460552","DOI":"10.5220\/0006263405460552"},{"key":"3_CR27","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.ijepes.2017.01.016","volume":"90","author":"S Poudel","year":"2017","unstructured":"Poudel, S., Ni, Z., Malla, N.: Real-time cyber physical system testbed for power system security and control. Int. J. Electr. Power Energy Syst. 90, 124\u2013133 (2017)","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"3_CR28","volume-title":"The IESNA Lighting Handbook: Reference & Application","author":"M Rea","year":"2000","unstructured":"Rea, M.: The IESNA Lighting Handbook: Reference & Application. Illuminating Engineering Society of North America, New York (2000)"},{"key":"3_CR29","doi-asserted-by":"publisher","unstructured":"Ronen, E., Shamir, A.: Extended functionality attacks on IoT devices: the case of smart lights. In: IEEE European Symposium on Security and Privacy, EuroS&P 2016, Saarbr\u00fccken, Germany, 21\u201324 March 2016, pp. 3\u201312 (2016). \nhttps:\/\/doi.org\/10.1109\/EuroSP.2016.13","DOI":"10.1109\/EuroSP.2016.13"},{"key":"3_CR30","volume-title":"ACSM\u2019s Health\/Fitness Facilities Standards and Guidelines","author":"M Sanders","year":"2019","unstructured":"Sanders, M.: ACSM\u2019s Health\/Fitness Facilities Standards and Guidelines. Human Kinetics, Champaign (2019)"},{"key":"3_CR31","unstructured":"Strom, B.E., Applebaum, A., Miller, D.P., Nickels, K.C., Pennington, A.G., Thomas, C.B.: Mitre ATT&CK$$^\\text{TM}$$: design and philosophy. Technical report (2018)"},{"key":"3_CR32","series-title":"Advanced Sciences and Technologies for Security Applications","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-3-030-12330-7_14","volume-title":"Security and Privacy Trends in the Industrial Internet of Things","author":"NO Tippenhauer","year":"2019","unstructured":"Tippenhauer, N.O.: Design and realization of testbeds for security research in the industrial internet of things. In: Alcaraz, C. (ed.) Security and Privacy Trends in the Industrial Internet of Things. ASTSA, pp. 287\u2013310. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-12330-7_14"},{"key":"3_CR33","doi-asserted-by":"publisher","unstructured":"Urbina, D.I., et al.: Limiting the impact of stealthy attacks on industrial control systems. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24\u201328 October 2016, pp. 1092\u20131105 (2016). \nhttps:\/\/doi.org\/10.1145\/2976749.2978388","DOI":"10.1145\/2976749.2978388"},{"key":"3_CR34","unstructured":"Wargocki, P.: Improving indoor air quality improves the performance of office work and school work (2008)"},{"key":"3_CR35","unstructured":"World Health Organization and others: Hospital safety index: Guide for evaluators (2015)"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-52683-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,7]],"date-time":"2020-07-07T00:04:59Z","timestamp":1594080299000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-52683-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030526825","9783030526832"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-52683-2_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"7 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DIMVA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lisbon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 June 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dimva2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dimva2020.campus.ciencias.ulisboa.pt\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Hotcrp","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"45","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}