{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:27:45Z","timestamp":1743092865156,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030931995"},{"type":"electronic","value":"9783030932008"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-93200-8_6","type":"book-chapter","created":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T05:30:01Z","timestamp":1641015001000},"page":"99-115","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Survey on\u00a0Applications of\u00a0Formal Methods in\u00a0Analysis of\u00a0SCADA Systems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5854-6597","authenticated-orcid":false,"given":"Mihael","family":"Marovi\u0107","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2437-8134","authenticated-orcid":false,"given":"Ante","family":"Derek","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6619-2859","authenticated-orcid":false,"given":"Stjepan","family":"Gro\u0161","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,1]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Amoah, R., Camtepe, S., Foo, E.: Formal modelling and analysis of DNP3 secure authentication. J. Netw. Comput. Appl. 59, 345\u2013360 (2016). https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1084804515001228","DOI":"10.1016\/j.jnca.2015.05.015"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Amoah, R., Suriadi, S., Camtepe, S., Foo, E.: Security analysis of the non-aggressive challenge response of the DNP3 protocol using a CPN model. In: 2014 IEEE International Conference on Communications (ICC), pp. 827\u2013833 (2014)","DOI":"10.1109\/ICC.2014.6883422"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Byres, E.: The air gap: Scada\u2019s enduring security myth. Commun. ACM 56(8), 29\u201331 (2013). https:\/\/doi.org\/10.1145\/2492007.2492018","DOI":"10.1145\/2492007.2492018"},{"issue":"1","key":"6_CR4","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/TII.2010.2099233","volume":"7","author":"M Cheminod","year":"2011","unstructured":"Cheminod, M., Pironti, A., Sisto, R.: Formal vulnerability analysis of a security system for remote fieldbus access. IEEE Trans. Industr. Inf. 7(1), 30\u201340 (2011)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-319-66402-6_23","volume-title":"Computer Security \u2013 ESORICS 2017","author":"C Cremers","year":"2017","unstructured":"Cremers, C., Dehnel-Wild, M., Milner, K.: Secure authentication in the grid: a formal analysis of DNP3: SAv5. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10492, pp. 389\u2013407. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66402-6_23"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Dreier, J., Puys, M., Potet, M.L., Lafourcade, P., Roch, J.L.: Formally and practically verifying flow integrity properties in industrial systems. Comput. Secur. 86, 453\u2013470 (2018). https:\/\/hal.archives-ouvertes.fr\/hal-01959766","DOI":"10.1016\/j.cose.2018.09.018"},{"key":"6_CR7","series-title":"IFIP International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-0-387-75462-8_14","volume-title":"Critical Infrastructure Protection","author":"B Dutertre","year":"2008","unstructured":"Dutertre, B.: Formal modeling and analysis of the modbus protocol. In: Goetz, E., Shenoi, S. (eds.) ICCIP 2007. IIFIP, vol. 253, pp. 189\u2013204. Springer, Boston, MA (2008). https:\/\/doi.org\/10.1007\/978-0-387-75462-8_14"},{"key":"6_CR8","series-title":"IFIP International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-0-387-75462-8_15","volume-title":"Critical Infrastructure Protection","author":"J Edmonds","year":"2008","unstructured":"Edmonds, J., Papa, M., Shenoi, S.: Security analysis of multilayer SCADA protocols. In: Goetz, E., Shenoi, S. (eds.) ICCIP 2007. IIFIP, vol. 253, pp. 205\u2013221. Springer, Boston, MA (2008). https:\/\/doi.org\/10.1007\/978-0-387-75462-8_15"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Fadi, O., Dhaussy, P.: Formal verification of security pattern composition: application to SCADA. Comput. Inform. 38(5), 1149\u20131180 (2019). https:\/\/hal.archives-ouvertes.fr\/hal-02514951","DOI":"10.31577\/cai_2019_5_1149"},{"key":"6_CR10","doi-asserted-by":"publisher","first-page":"135812","DOI":"10.1109\/ACCESS.2019.2926441","volume":"7","author":"S Ghosh","year":"2019","unstructured":"Ghosh, S., Sampalli, S.: A survey of security in scada networks: current issues and future challenges. IEEE Access 7, 135812\u2013135831 (2019)","journal-title":"IEEE Access"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Gnesi, S., Margaria, T.: Formal Methods for Industrial Critical Systems: A Survey of Applications. IEEE, USA (2013)","DOI":"10.1002\/9781118459898"},{"key":"6_CR12","unstructured":"Power Systems Management and Associated Information Exchange-Data and Communications Security Part 1: Communication Network and System Security-Introduction to Security Issues, Standard, International Electrotechnical Commission, Geneva, Switzerland (2007)"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Jin, W., Gao, X., Li, J.: Modeling profinet actions with timing pi-calculus. In: Proceedings of the First International Conference on Information Sciences, Machinery, Materials and Energy, pp. 397\u2013402. Atlantis Press (2015). https:\/\/doi.org\/10.2991\/icismme-15.2015.79","DOI":"10.2991\/icismme-15.2015.79"},{"key":"6_CR14","unstructured":"Johnson, R.E.: Survey of scada security challenges and potential attack vectors. In: 2010 International Conference for Internet Technology and Secured Transactions, pp. 1\u20135 (2010)"},{"issue":"8","key":"6_CR15","doi-asserted-by":"publisher","first-page":"6582","DOI":"10.1109\/TIE.2017.2682042","volume":"64","author":"G Kunz","year":"2017","unstructured":"Kunz, G., Machado, J., Perondi, E., Vyatkin, V.: A formal methodology for accomplishing IEC 61850 real-time communication requirements. IEEE Trans. Industr. Electron. 64(8), 6582\u20136590 (2017)","journal-title":"IEEE Trans. Industr. Electron."},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Mari\u00f1o, P., Nogueira, J., Sig\u00fcenza, C., Poza, F., Dom\u0131\u00fcnguez, M.: The profibus formal specification: a comparison between two FDTS. Comput. Netw. 37(3), 345\u2013362 (2001). https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1389128601002079","DOI":"10.1016\/S1389-1286(01)00207-9"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Mari\u00f1o, P., Poza, F., Dominguez, M., Nogueira, J.: Design of worldfip\u2019s industrial communication systems based on formal methods. In: ISIE 1999. Proceedings of the IEEE International Symposium on Industrial Electronics (Cat. No. 99TH8465), vol. 3, pp. 1427\u20131432 (1999)","DOI":"10.1109\/ISIE.1999.796924"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Mercaldo, F., Martinelli, F., Santone, A.: Real-time scada attack detection by means of formal methods. In: 2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), pp. 231\u2013236 (2019)","DOI":"10.1109\/WETICE.2019.00057"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Nardone, R., Rodr\u00edguez, R.J., Marrone, S.: Formal security assessment of modbus protocol. In: 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 142\u2013147 (2016)","DOI":"10.1109\/ICITST.2016.7856685"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Nazir, S., Patel, S., Patel, D.: Assessing and augmenting scada cyber security: a survey of techniques. Comput. Secur. 70, 436\u2013454 (2017). https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404817301293","DOI":"10.1016\/j.cose.2017.06.010"},{"issue":"3","key":"6_CR21","doi-asserted-by":"publisher","first-page":"1942","DOI":"10.1109\/COMST.2020.2987688","volume":"22","author":"D Pliatsios","year":"2020","unstructured":"Pliatsios, D., Sarigiannidis, P., Lagkas, T., Sarigiannidis, A.G.: A survey on scada systems: secure protocols, incidents, threats and tactics. IEEE Commun. Surv. Tutor. 22(3), 1942\u20131976 (2020)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Poschmann, A., Hahniche, J., Deicke, P., Neumann, P.: Experience with formal methods implementing the PROFIBUS FMS and DP protocol for industrial applications. In: Proceedings 1997 IEEE International Workshop on Factory Communication Systems, WFCS 1997, pp. 277\u2013286 (1997)","DOI":"10.1109\/WFCS.1997.634310"},{"key":"6_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-319-45477-1_6","volume-title":"Computer Safety, Reliability, and Security","author":"M Puys","year":"2016","unstructured":"Puys, M., Potet, M.-L., Lafourcade, P.: Formal analysis of security properties on the OPC-UA SCADA protocol. In: Skavhaug, A., Guiochet, J., Bitsch, F. (eds.) SAFECOMP 2016. LNCS, vol. 9922, pp. 67\u201375. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45477-1_6"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Rahman, M.A., Jakaria, A.H.M., Al-Shaer, E.: Formal analysis for dependable supervisory control and data acquisition in smart grids. In: 2016 46th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 263\u2013274 (2016)","DOI":"10.1109\/DSN.2016.32"},{"key":"6_CR25","unstructured":"Rebane, J.C.: The Stuxnet Computer Worm and Industrial Control System Security. Nova Science Publishers Inc., USA (2011)"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Rysavy, O., Rab, J., Halfar, P., Sveda, M.: A formal authorization framework for networked scada systems. In: 2012 IEEE 19th International Conference and Workshops on Engineering of Computer-Based Systems, pp. 298\u2013302 (2012)","DOI":"10.1109\/ECBS.2012.4"},{"key":"6_CR27","first-page":"313","volume":"18","author":"I Siddavatam","year":"2017","unstructured":"Siddavatam, I., Parekh, S., Shah, T., Kazi, F.: Testing and validation of modbus\/TCP protocol for secure SCADA communication in CPS using formal methods. Scalable Comput. Pract. Exp. 18, 313\u2013330 (2017)","journal-title":"Scalable Comput. Pract. Exp."},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Stouffer, K.A., Falco, J.A., Scarfone, K.A.: SP 800-82. Guide to industrial control systems (ICS) security: supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other control system configurations such as programmable logic controllers (PLC). Technical report, National Institute of Standards and Technology, Gaithersburg, MD, USA (2011)","DOI":"10.6028\/NIST.SP.800-82"},{"key":"6_CR29","doi-asserted-by":"crossref","unstructured":"Sun, R., Mera, A., Lu, L., Choffnes, D.: SoK: attacks on industrial control logic and formal verification-based defenses. In: 2021 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE Computer Society (2021)","DOI":"10.1109\/EuroSP51992.2021.00034"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-93200-8_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T14:01:32Z","timestamp":1726408892000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-93200-8_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030931995","9783030932008"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-93200-8_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CRITIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Critical Information Infrastructures Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lausanne","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Switzerland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"critis2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/critis2021.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}