{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:03:02Z","timestamp":1763190182935,"version":"3.45.0"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032104656","type":"print"},{"value":"9783032104663","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,11,16]],"date-time":"2025-11-16T00:00:00Z","timestamp":1763251200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,16]],"date-time":"2025-11-16T00:00:00Z","timestamp":1763251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-10466-3_11","type":"book-chapter","created":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T06:59:04Z","timestamp":1763189944000},"page":"126-138","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["TIDF: Timing-Based Device Fingerprinting for\u00a0PLCs"],"prefix":"10.1007","author":[{"given":"Lei","family":"Xiang","sequence":"first","affiliation":[]},{"given":"Hao","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,16]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Aguayo\u00a0Gonzalez, C., Hinton, A.: Detecting malicious software execution in programmable logic controllers using power fingerprinting. In: Proceedings of Critical Infrastructure Protection, pp. 15\u201327. Springer (2014)","DOI":"10.1007\/978-3-662-45355-1_2"},{"key":"11_CR2","unstructured":"Ahmed, C.M., Calder, M., Gunawan, S., Prakash, J., Nagaraja, S., Zhou, J.: Time constant: actuator fingerprinting using transient response of device and process in ICS (2024)"},{"key":"11_CR3","unstructured":"Al\u00a0Ghazo, A.T., Kumar, R.: ICS\/SCADA device recognition: a hybrid communication-patterns and passive-fingerprinting approach. In: Proceedings of IFIP\/IEEE IM, pp. 19\u201324. IEEE (2019)"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Caselli, M., Hadziosmanovic, D., Zambon, E., Kargl, F.: On the feasibility of device fingerprinting in industrial control systems. In: Proceedings of Critical Information Infrastructures Security, pp. 155\u2013166. Springer (2013)","DOI":"10.1007\/978-3-319-03964-0_14"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Chaudhry, J., Qidwai, U., Miraz, M.H.: Securing big data from eavesdropping attacks in SCADA\/ICS network data streams through impulsive statistical fingerprinting. arXiv preprint arXiv:1909.11021 (2019)","DOI":"10.1007\/978-3-030-23943-5_6"},{"key":"11_CR6","unstructured":"Cho, K.T., Shin, K.G.: Fingerprinting electronic control units for vehicle intrusion detection. In: 25th USENIX Security Symposium (USENIX Security 16), pp. 911\u2013927 (2016)"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Cho, K.T., Shin, K.G.: Viden: attacker identification on in-vehicle networks. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1109\u20131123 (2017)","DOI":"10.1145\/3133956.3134001"},{"key":"11_CR8","doi-asserted-by":"publisher","first-page":"3376","DOI":"10.1109\/TIFS.2023.3277688","volume":"18","author":"MM Cook","year":"2023","unstructured":"Cook, M.M., Marnerides, A.K., Pezaros, D.: PLCPrint: fingerprinting memory attacks in programmable logic controllers. IEEE Trans. Inf. Forensics Secur. 18, 3376\u20133387 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Formby, D., Srinivasan, P., Leonard, A.M., Rogers, J.D., Beyah, R.A.: Who\u2019s in control of your control system? Device fingerprinting for cyber-physical systems. In: NDSS (2016)","DOI":"10.14722\/ndss.2016.23142"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Gao, J., et al.: An effective defense method based on hash authentication against mode-switching attack of ormon PLC. In: Proceedings of ICSP, pp. 976\u2013979. IEEE (2022)","DOI":"10.1109\/ICSP54964.2022.9778843"},{"key":"11_CR11","unstructured":"Hrynkiewicz, E., Chmiel, M.: Programmable logic controller-basic structure and idea of programming. Electric. Rev. 88(11b\/2012), 98\u2013101 (2012)"},{"issue":"2","key":"11_CR12","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/TDSC.2005.26","volume":"2","author":"T Kohno","year":"2005","unstructured":"Kohno, T., Broido, A., Claffy, K.C.: Remote physical device fingerprinting. IEEE Trans. Dependable Secure Comput. 2(2), 93\u2013108 (2005)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"14s","key":"11_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3584944","volume":"55","author":"V Kumar","year":"2023","unstructured":"Kumar, V., Paul, K.: Device fingerprinting for cyber-physical systems: a survey. ACM Comput. Surv. 55(14s), 1\u201341 (2023)","journal-title":"ACM Comput. Surv."},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Li, D., et al.: FPHammer: a device identification framework based on dram fingerprinting. In: Proceedings of TrustCom, pp. 1031\u20131040. IEEE (2023)","DOI":"10.1109\/TrustCom60117.2023.00144"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Peng, Y., Xiang, C., Gao, H., Chen, D., Ren, W.: Industrial control system fingerprinting and anomaly detection. In: Rice, M., Shenoi, S. (eds.) IFIP Advances in Information and Communication Technology. Critical Infrastructure Protection IX, vol. AICT-466, pp. 73\u201385. Springer (2015)","DOI":"10.1007\/978-3-319-26567-4_5"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Sanchez-Rola, I., Santos, I., Balzarotti, D.: Clock around the clock: time-based device fingerprinting. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1502\u20131514 (2018)","DOI":"10.1145\/3243734.3243796"},{"key":"11_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2019.100306","volume":"26","author":"M Stockman","year":"2019","unstructured":"Stockman, M., Dwivedi, D., Gentz, R., Peisert, S.: Detecting control system misbehavior by fingerprinting programmable logic controller functionality. Int. J. Crit. Infrastruct. Prot. 26, 100306 (2019)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"issue":"2","key":"11_CR18","doi-asserted-by":"publisher","first-page":"731","DOI":"10.3390\/app13020731","volume":"13","author":"J Tao","year":"2023","unstructured":"Tao, J., Yuan, X., Zhang, S., Xu, Y.: Development of fingerprint identification based on device flow in industrial control system. Appl. Sci. 13(2), 731 (2023)","journal-title":"Appl. Sci."},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Thom, J., Thom, N., Sengupta, S., Hand, E.: Smart recon: network traffic fingerprinting for IoT device identification. In: 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0072\u20130079. IEEE (2022)","DOI":"10.1109\/CCWC54503.2022.9720739"},{"issue":"5","key":"11_CR20","doi-asserted-by":"publisher","first-page":"7980","DOI":"10.1109\/JIOT.2019.2913627","volume":"6","author":"Q Tian","year":"2019","unstructured":"Tian, Q., et al.: New security mechanisms of high-reliability IoT communication based on radio frequency fingerprint. IEEE Internet Things J. 6(5), 7980\u20137987 (2019)","journal-title":"IEEE Internet Things J."},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Xia, D., Jiang, C., Wan, J., Jin, J., Leung, V.C.M., Mart\u00ednez-Garc\u00eda, M.: Heterogeneous network access and fusion in smart factory: a survey. ACM Comput. Surv. 55(6), 1\u201331 (2022)","DOI":"10.1145\/3530815"},{"issue":"5","key":"11_CR22","doi-asserted-by":"publisher","first-page":"955","DOI":"10.1109\/JSAC.2020.2980921","volume":"38","author":"K Yang","year":"2020","unstructured":"Yang, K., Li, Q., Lin, X., Chen, X., Sun, L.: iFinger: intrusion detection in industrial control systems via register-based fingerprinting. IEEE J. Sel. Areas Commun. 38(5), 955\u2013967 (2020)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Yimer, T., Arafin, M.T., Kornegay, K.: Securing industrial control systems using physical device fingerprinting. In: Proceedings of IOTSMS, pp.\u00a01\u20136. IEEE (2020)","DOI":"10.1109\/IOTSMS52051.2020.9340160"},{"key":"11_CR24","unstructured":"Zander, S., Murdoch, S.J.: An improved clock-skew measurement technique for revealing hidden services. In: USENIX Security Symposium, pp. 211\u2013226 (2008)"},{"key":"11_CR25","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/j.promfg.2020.01.334","volume":"39","author":"W Zhang","year":"2019","unstructured":"Zhang, W., et al.: Armor PLC: a platform for cyber security threats assessments for PLCs. Procedia Manuf. 39, 270\u2013278 (2019)","journal-title":"Procedia Manuf."},{"issue":"7","key":"11_CR26","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1007\/s11265-021-01656-0","volume":"93","author":"F Zhou","year":"2021","unstructured":"Zhou, F., Qu, H., Liu, H., Liu, H., Li, B.: Fingerprinting IIoT devices through machine learning techniques. J. Sig. Process. Syst. 93(7), 779\u2013794 (2021)","journal-title":"J. Sig. Process. Syst."}],"container-title":["Lecture Notes in Computer Science","Network and Parallel Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-10466-3_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T06:59:07Z","timestamp":1763189947000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-10466-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,16]]},"ISBN":["9783032104656","9783032104663"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-10466-3_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,16]]},"assertion":[{"value":"16 November 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NPC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Network and Parallel Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nha Trang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 November 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"npc2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.npc-conference.com\/#\/npc2025","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}