{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:58:19Z","timestamp":1742929099416,"version":"3.40.3"},"publisher-location":"Cham","reference-count":64,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030616373"},{"type":"electronic","value":"9783030616380"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-61638-0_15","type":"book-chapter","created":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T23:08:28Z","timestamp":1602630508000},"page":"255-273","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Post-exploitation and Persistence Techniques Against Programmable Logic\u00a0Controller"],"prefix":"10.1007","author":[{"given":"Andrei","family":"Bytes","sequence":"first","affiliation":[]},{"given":"Jianying","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,14]]},"reference":[{"key":"15_CR1","unstructured":"Abbasi, A., Hashemi, M.: Ghost in the PLC: designing an undetectable programmable logic controller rootkit via pin control attack, pp. 1\u201335. Black Hat, November 2016. \nhttps:\/\/research.utwente.nl\/en\/publications\/ghost-in-the-plc-designing-an-undetectable-programmable-logic-con"},{"key":"15_CR2","doi-asserted-by":"publisher","unstructured":"Ahmed, C.M., et al.: Noiseprint: attack detection using sensor and process noise fingerprint in cyber physical systems. In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security. ASIACCS 2018, pp. 483\u2013497. Association for Computing Machinery, New York (2018). \nhttps:\/\/doi.org\/10.1145\/3196494.3196532","DOI":"10.1145\/3196494.3196532"},{"key":"15_CR3","doi-asserted-by":"publisher","unstructured":"Bytes, A., Adepu, S., Zhou, J.: Towards semantic sensitive feature profiling of IoT devices. IEEE Internet Things J., (2019). \nhttps:\/\/doi.org\/10.1109\/JIOT.2019.2903739","DOI":"10.1109\/JIOT.2019.2903739"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Cardenas, A., Amin, S., Sastry, S.: Secure control: towards survivable cyber-physical systems. In: 2008 28th International Conference on Distributed Computing Systems Workshops. ICDCS 2008, pp. 495\u2013500, June 2008","DOI":"10.1109\/ICDCS.Workshops.2008.40"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Casey, P., Topor, M., Hennessy, E., Alrabaee, S., Aloqaily, M., Boukerche, A.: Applied comparative evaluation of the metasploit evasion module. In: 2019 IEEE Symposium on Computers and Communications (ISCC), pp. 1\u20136 (2019)","DOI":"10.1109\/ISCC47284.2019.8969663"},{"key":"15_CR6","doi-asserted-by":"publisher","unstructured":"Castellanos, J.H., Ochoa, M., Zhou, J.: Finding dependencies between cyber-physical domains for security testing of industrial control systems. ACM, December 2018. \nhttps:\/\/doi.org\/10.1145\/3274694.3274745","DOI":"10.1145\/3274694.3274745"},{"key":"15_CR7","unstructured":"Cobb, P.: German steel mill meltdown: rising stakes in the internet of things (2015). \nhttps:\/\/securityintelligence.com\/german-steel-mill-meltdown-rising-stakes-in-the-internet-of-things\/"},{"key":"15_CR8","unstructured":"Costin, A., Zaddach, J.: Embedded Devices Security and Firmware Reverse Engineering. ResearchGate, July 2013. \nhttps:\/\/www.researchgate.net\/publication\/259642928_Embedded_Devices_Security_and_Firmware_Reverse_Engineering"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Cozzi, E., Graziano, M., Fratantonio, Y., Balzarotti, D.: Understanding Linux malware. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 161\u2013175 (2018)","DOI":"10.1109\/SP.2018.00054"},{"key":"15_CR10","unstructured":"Dragos: CRASHOVERRIDE: Analyzing the Malware that Attacks Power Grids\u2014Dragos, April 2019. \nhttps:\/\/dragos.com\/resource\/crashoverride-analyzing-the-malware-that-attacks-power-grids\n\n. Accessed 14 Apr 2019"},{"key":"15_CR11","doi-asserted-by":"publisher","unstructured":"Garcia, L.A., Brasser, F., Cintuglu, M.H., Sadeghi, A.R., Zonouz, S.A.: Hey, my malware knows physics! Attacking PLCs with physical model aware rootkit. ResearchGate, January 2017. \nhttps:\/\/doi.org\/10.14722\/ndss.2017.23313","DOI":"10.14722\/ndss.2017.23313"},{"key":"15_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/978-3-319-72817-9_8","volume-title":"Computer Security","author":"N Govil","year":"2018","unstructured":"Govil, N., Agrawal, A., Tippenhauer, N.O.: On ladder logic bombs in industrial control systems. In: Katsikas, S.K., et al. (eds.) CyberICPS\/SECPRE -2017. LNCS, vol. 10683, pp. 110\u2013126. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-319-72817-9_8"},{"key":"15_CR13","unstructured":"Hsiao, S.W., Sun, Y.S., Chen, M.C., Zhang, H.: Cross-level behavioral analysis for robust early intrusion detection. In: 2010 IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 95\u2013100. IEEE (2010)"},{"key":"15_CR14","doi-asserted-by":"publisher","unstructured":"Huang, T., Zhou, J., Bytes, A.: ATG: an attack traffic generation tool for security testing of in-vehicle CAN bus. ResearchGate, pp. 1\u20136, August 2018. \nhttps:\/\/doi.org\/10.1145\/3230833.3230843","DOI":"10.1145\/3230833.3230843"},{"key":"15_CR15","unstructured":"IEC 61131\u20133 industrial control programming standard. \nhttps:\/\/www.isa.org\/standards-publications\/isa-publications\/intech-magazine\/2012\/october"},{"key":"15_CR16","unstructured":"Firmware from Rockwell Automation - Software Download, April 2019. \nhttps:\/\/www.rockwellautomation.com\/rockwellsoftware\/support\/firmware.page\n\n. Accessed 15 Apr 2019"},{"key":"15_CR17","unstructured":"Operating System Update for SIMATIC S7\u20131200 CPU Firmware V3 - ID: 64789124 - Industry Support Siemens, April 2019. \nhttps:\/\/support.industry.siemens.com\/cs\/document\/64789124\/operating-system-update-for-simatic-s7-1200-cpu-firmware-v3?dti=0&pnid=13615&lc=en-WW\n\n. Accessed 15 Apr 2019"},{"key":"15_CR18","unstructured":"Support Packages for the hardware catalog in the TIA Portal (HSP) - ID: 72341852 - Industry Support Siemens, April 2019. \nhttps:\/\/support.industry.siemens.com\/cs\/document\/72341852\/support-packages-for-the-hardware-catalog-in-the-tia-portal-(hsp)?dti=0&pnid=13615&lc=en-US\n\n. Accessed 15 Apr 2019"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Keliris, A., Maniatakos, M.: ICSREF: a framework for automated reverse engineering of industrial control systems binaries. In: The Network and Distributed System Security Symposium (NDSS) (2019)","DOI":"10.14722\/ndss.2019.23271"},{"key":"15_CR20","doi-asserted-by":"publisher","unstructured":"Krotofil, M., Gollmann, D.: Industrial control systems security: what is happening?, pp. 664\u2013669. ResearchGate, July 2013. \nhttps:\/\/doi.org\/10.1109\/INDIN.2013.6622963","DOI":"10.1109\/INDIN.2013.6622963"},{"key":"15_CR21","unstructured":"Lee, E.A.: cyber-physical systems: design challenges. Technical report UCB\/EECS-2008-8, EECS Department, University of California, Berkeley, January 2008. \nhttp:\/\/www.eecs.berkeley.edu\/Pubs\/TechRpts\/2008\/EECS-2008-8.html"},{"key":"15_CR22","unstructured":"Lipovsky, R.: New wave of cyber attacks against Ukrainian power industry, January 2016. \nhttp:\/\/www.welivesecurity.com\/2016\/01\/11"},{"key":"15_CR23","unstructured":"Lufkin, D.: Programmable Logic Controllers: A Practical Approach to IEC 61131\u20133 using CoDeSys (12 2015)"},{"key":"15_CR24","unstructured":"McLaughlin, S.: On dynamic malware payloads aimed at programmable logic controllers, p. 10. ResearchGate, August 2011. \nhttps:\/\/www.researchgate.net\/publication\/262355936_On_dynamic_malware_payloads_aimed_at_programmable_logic_controllers"},{"key":"15_CR25","doi-asserted-by":"publisher","unstructured":"McLaughlin, S., McDaniel, P.: SABOT: specification-based payload generation for Programmable Logic Controllers, pp. 439\u2013449. ResearchGate, October 2012. \nhttps:\/\/doi.org\/10.1145\/2382196.2382244","DOI":"10.1145\/2382196.2382244"},{"key":"15_CR26","doi-asserted-by":"publisher","unstructured":"McLaughlin, S., Zonouz, S., Pohly, D., McDaniel, P.: A trusted safety verifier for process controller code. ResearchGate, January 2014. \nhttps:\/\/doi.org\/10.14722\/ndss.2014.23043","DOI":"10.14722\/ndss.2014.23043"},{"key":"15_CR27","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-642-35764-0_4","volume-title":"Critical Infrastructure Protection VI","author":"J Mulder","year":"2012","unstructured":"Mulder, J., Schwartz, M., Berg, M., Van Houten, J., Urrea, J.M., Pease, A.: Analysis of field devices used in industrial control systems. In: Butts, J., Shenoi, S. (eds.) ICCIP 2012. IAICT, vol. 390, pp. 45\u201357. Springer, Heidelberg (2012). \nhttps:\/\/doi.org\/10.1007\/978-3-642-35764-0_4"},{"key":"15_CR28","unstructured":"Noergaard, T.: Embedded Systems Architecture: A Comprehensive Guide for Engineers and Programmers. Newnes (2013). \nhttps:\/\/books.google.com.sg\/books\/about\/Embedded_Systems_Architecture.html?id=piGhuAAACAAJ&source=kp_book_description&redir_esc=y"},{"key":"15_CR29","unstructured":"Online: Wago-i\/o-system codesys 2.3 webvisu password extraction (2019). \nhttps:\/\/packetstormsecurity.com\/files\/127438\/WAGO-I-O-SYSTEM-CODESYS-2.3-WebVisu-Password-Extraction.html"},{"key":"15_CR30","doi-asserted-by":"publisher","unstructured":"Siddiqi, A., Tippenhauer, N.O., Mashima, D., Chen, B.: On practical threat scenario testing in an electric power ICS testbed. In: Proceedings of the Cyber-Physical System Security Workshop (CPSS), co-located with ASIACCS, June 2018. \nhttps:\/\/doi.org\/10.1145\/3198458.3198461","DOI":"10.1145\/3198458.3198461"},{"key":"15_CR31","unstructured":"Toolchains - eLinux.org, April 2019. \nhttps:\/\/elinux.org\/Toolchains\n\n. Accessed 15 Apr 2019"},{"key":"15_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-030-21568-2_9","volume-title":"Applied Cryptography and Network Security","author":"J Giraldo","year":"2019","unstructured":"Giraldo, J., Urbina, D., Cardenas, A.A., Tippenhauer, N.O.: Hide and seek: an architecture for improving attack-visibility in industrial control systems. In: Deng, R.H., Gauthier-Uma\u00f1a, V., Ochoa, M., Yung, M. (eds.) ACNS 2019. LNCS, vol. 11464, pp. 175\u2013195. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-21568-2_9"},{"key":"15_CR33","doi-asserted-by":"crossref","unstructured":"Urias, V., Van Leeuwen, B., Richardson, B.: Supervisory Command and Data Acquisition (SCADA) system cyber security analysis using a live, virtual, and constructive (LVC) testbed. In: 2012 Military Communications Conference - MILCOM 2012, pp. 1\u20138 (2012)","DOI":"10.1109\/MILCOM.2012.6415818"},{"key":"15_CR34","doi-asserted-by":"publisher","unstructured":"Valentine, S., Farkas, C.: Software security: application-level vulnerabilities in SCADA systems, pp. 498\u2013499. ResearchGate, August 2011. \nhttps:\/\/doi.org\/10.1109\/IRI.2011.6009603","DOI":"10.1109\/IRI.2011.6009603"},{"key":"15_CR35","unstructured":"Codesys. The system. \nhttps:\/\/www.codesys.com\/the-system.html"},{"key":"15_CR36","unstructured":"Security for controller pfc100\/pfc200 v 1.1.0, 5 December 2018. \nhttps:\/\/www.wago.com\/medias\/mxxxxxxxx-CyberSecurity-0en.pdf"},{"key":"15_CR37","unstructured":"Wago controllers brochure. \nhttps:\/\/www.wago.com\/infomaterial\/pdf\/60386168.pdf"},{"key":"15_CR38","unstructured":"Wago ethernet web-based management authentication bypass vulnerability. \nhttps:\/\/ics-cert.us-cert.gov\/advisories\/ICSA-16-357-02"},{"key":"15_CR39","unstructured":"(May 2014). \nhttps:\/\/www.wago.com\/infomaterial\/pdf\/51236524.pdf\n\n. Accessed 15 Apr 2019"},{"key":"15_CR40","unstructured":"Vulnerabilities in WAGO PFC 200 Series (2017). \nhttps:\/\/sec-consult.com\/en\/blog\/advisories\/wago-pfc-200-series-critical-codesys-vulnerabilities\/index.html"},{"key":"15_CR41","unstructured":"(Apr 2019). \nhttps:\/\/www.wago.com\/sg\/download\/public\/IoT-Brosch%25C3%25BCre\/AU-NA-DE-DE-FP-180827_001%2BIoT-Box%2BBrochure_web.pdf\n\n. Accessed 15 Apr 2019"},{"key":"15_CR42","unstructured":"Codesys device directory, April 2019. \nhttps:\/\/devices.codesys.com\/device-directory.html\n\n. Accessed 15 Apr 2019"},{"key":"15_CR43","unstructured":"WAGO Global\u2014swreg$$\\_$$linux$$\\_$$c, April 2019. \nhttps:\/\/www.wago.com\/global\/d\/swreg_linux_c\n\n. Accessed 15 Apr 2019"},{"key":"15_CR44","unstructured":"WAGO\u2014Controllers with Embedded Linux, April 2019. \nhttps:\/\/www.wago.com\/sg\/embedded-linux\n\n. Accessed 15 Apr 2019"},{"key":"15_CR45","unstructured":"WAGO\u2014IoT PLC Controllers with MQTT Protocol for Industry 4.0, April 2019. \nhttps:\/\/www.wago.com\/sg\/automation-technology\/plc-mqtt-iot\n\n. Accessed 15 Apr 2019"},{"key":"15_CR46","unstructured":"WAGO\u2014WebVisu, April 2019. \nhttps:\/\/www.wago.com\/global\/automation-technology\/discover-software\/webvisu\n\n. Accessed 15 Apr 2019"},{"key":"15_CR47","unstructured":"Talos Vulnerability Report 2019\u20130923 (2020). \nhttps:\/\/talosintelligence.com\/vulnerability_reports\/TALOS-2019-0923"},{"key":"15_CR48","unstructured":"Talos Vulnerability Report 2019\u20130950 (2020). \nhttps:\/\/talosintelligence.com\/vulnerability_reports\/TALOS-2019-0950"},{"key":"15_CR49","unstructured":"Talos Vulnerability Report 2019\u20130961 (2020). \nhttps:\/\/talosintelligence.com\/vulnerability_reports\/TALOS-2019-0961"},{"key":"15_CR50","unstructured":"Talos Vulnerability Report 2019\u20130962 (2020). \nhttps:\/\/talosintelligence.com\/vulnerability_reports\/TALOS-2019-0962"},{"key":"15_CR51","unstructured":"Technical basics: Preempt RT (2020). \nhttps:\/\/wiki.linuxfoundation.org\/realtime\/documentation\/technical_basics\/start"},{"key":"15_CR52","unstructured":"WAGO e!Cockpit authentication hard-coded encryption key vulnerability (2020). \nhttps:\/\/talosintelligence.com\/vulnerability_reports\/TALOS-2019-0898"},{"key":"15_CR53","unstructured":"WAGO e!COCKPIT Firmware Downgrade Vulnerability (2020). \nhttps:\/\/talosintelligence.com\/vulnerability_reports\/TALOS-2019-0951"},{"key":"15_CR54","unstructured":"WAGO PFC 200 Web-Based Management (WBM) Code Execution Vulnerability (2020). \nhttps:\/\/talosintelligence.com\/vulnerability_reports\/TALOS-2020-1010"},{"key":"15_CR55","unstructured":"WAGO PFC100\/200 Web-Based Management (WBM) FastCGI configuration insufficient resource pool denial of service (2020). \nhttps:\/\/talosintelligence.com\/vulnerability_reports\/TALOS-2019-0939"},{"key":"15_CR56","unstructured":"WAGO PFC200 Cloud Connectivity Multiple Command Injection Vulnerabilities (2020). \nhttps:\/\/talosintelligence.com\/vulnerability_reports\/TALOS-2019-0948"},{"key":"15_CR57","unstructured":"WAGO PFC200 Cloud Connectivity Remote Code Execution Vulnerability (2020). \nhttps:\/\/talosintelligence.com\/vulnerability_reports\/TALOS-2019-0954"},{"key":"15_CR58","unstructured":"WAGO PFC200 iocheckd service \u201cI\/O-Check\u201d getcouplerdetails remote code execution vulnerability (2020). \nhttps:\/\/talosintelligence.com\/vulnerability_reports\/TALOS-2019-0864"},{"key":"15_CR59","unstructured":"WAGO PFC200 iocheckd service \u201cI\/O-Check\u201d ReadPCBManuNum remote code execution vulnerability (2020). \nhttps:\/\/talosintelligence.com\/vulnerability_reports\/TALOS-2019-0873"},{"key":"15_CR60","unstructured":"WAGO PFC200 iocheckd service \u201cI\/O-Check\u201d ReadPCBManuNum remote code execution vulnerability (2020). \nhttps:\/\/talosintelligence.com\/vulnerability_reports\/TALOS-2019-0874"},{"key":"15_CR61","unstructured":"WAGO PFC200 iocheckd service \u201cI\/O-Check\u201d ReadPCBManuNum remote code execution vulnerability (2020). \nhttps:\/\/talosintelligence.com\/vulnerability_reports\/TALOS-2019-0863"},{"key":"15_CR62","unstructured":"WAGO PFC200 iocheckd service \u201cI\/O-Check\u201d ReadPSN remote code execution vulnerability (2020). \nhttps:\/\/talosintelligence.com\/vulnerability_reports\/TALOS-2019-0871"},{"key":"15_CR63","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1038\/474142a","volume":"174","author":"S Weinberger","year":"2011","unstructured":"Weinberger, S.: Computer security: is this the start of cyberwarfare? Nature 174, 142\u2013145 (2011)","journal-title":"Nature"},{"issue":"6","key":"15_CR64","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2014.113","volume":"12","author":"S Zonouz","year":"2014","unstructured":"Zonouz, S., Rrushi, J., McLaughlin, S.: Detecting industrial control malware using automated PLC code analytics. IEEE Secur. Priv. Mag. 12(6), 40\u201347 (2014). \nhttps:\/\/doi.org\/10.1109\/MSP.2014.113","journal-title":"IEEE Secur. Priv. Mag."}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-61638-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T23:23:20Z","timestamp":1602631400000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-61638-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030616373","9783030616380"],"references-count":64,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-61638-0_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sites.google.com\/di.uniroma1.it\/ACNS2020","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"214","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.7","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the Corona pandemic the conference was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}