{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T04:06:26Z","timestamp":1748577986984,"version":"3.41.0"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319203751"},{"type":"electronic","value":"9783319203768"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_60","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"672-683","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Using Logical Error Detection in Software Controlling Remote-Terminal Units to Predict Critical Information Infrastructures Failures"],"prefix":"10.1007","author":[{"given":"George","family":"Stergiopoulos","sequence":"first","affiliation":[]},{"given":"Marianthi","family":"Theocharidou","sequence":"additional","affiliation":[]},{"given":"Dimitris","family":"Gritzalis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"key":"60_CR1","volume-title":"Securing SCADA Systems","author":"R Krutz","year":"2005","unstructured":"Krutz, R.: Securing SCADA Systems. Wiley, Indianapolis (2005)"},{"issue":"12","key":"60_CR2","doi-asserted-by":"publisher","first-page":"1414","DOI":"10.1002\/cpe.1615","volume":"23","author":"C Alcaraz","year":"2011","unstructured":"Alcaraz, C., Lopez, J., Zhou, J., Roman, R.: Secure SCADA framework for the protection of energy control systems. Concurrency Comput. Pract. Experience 23(12), 1414\u20131430 (2011)","journal-title":"Concurrency Comput. Pract. Experience"},{"issue":"2\/3","key":"60_CR3","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1504\/IJRAM.2011.042113","volume":"15","author":"M Theoharidou","year":"2011","unstructured":"Theoharidou, M., Kotzanikolaou, P., Gritzalis, D.: Risk assessment methodology for interdependent critical infrastructures. Int. J. Risk Assess. Manag. Special Issue on Risk Analysis of Critical Infrastructures 15(2\/3), 128\u2013148 (2011)","journal-title":"Int. J. Risk Assess. Manag. Spec. Issue Risk Anal. Crit. Infrastruct."},{"key":"60_CR4","unstructured":"OpenSCADA: Open-source supervisory control and data acquisition system. http:\/\/openscada.org\/ . Accessed 2014"},{"key":"60_CR5","unstructured":"Wimberger, D.: Jamod - Java modbus implementation (jamod.sourceforge .net). http:\/\/jamod.sourceforge.net\/ (2004). Accessed 2014"},{"key":"60_CR6","unstructured":"Cardenas, A., Amin, S., Sastry, S.: Research challenges for the security of control systems. In: 3rd USENIX Workshop on Hot Topics in Security (HotSec 2008), USA (2008)"},{"key":"60_CR7","doi-asserted-by":"crossref","unstructured":"Chikuni, E., Dondo, M.: Investigating the security of electrical power systems SCADA. In: AFRICON (2007)","DOI":"10.1109\/AFRCON.2007.4401531"},{"key":"60_CR8","unstructured":"Felmetsger, V., Cavedon, L., Kruegel, C., Vigna, J.: Toward automated detection of logic vulnerabilities in web applications. In: Proceedings of the 19th USENIX Symposium, USA (2010)"},{"key":"60_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-642-28166-2_13","volume-title":"Engineering Secure Software and Systems","author":"G Stergiopoulos","year":"2012","unstructured":"Stergiopoulos, G., Tsoumas, B., Gritzalis, D.: Hunting application-level logical errors. In: Barthe, G., Livshits, B., Scandariato, R. (eds.) ESSoS 2012. LNCS, vol. 7159, pp. 135\u2013142. Springer, Heidelberg (2012)"},{"key":"60_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/978-3-642-38631-2_18","volume-title":"Network and System Security","author":"G Stergiopoulos","year":"2013","unstructured":"Stergiopoulos, G., Tsoumas, B., Gritzalis, D.: On business logic vulnerabilities hunting: the APP_LogGIC framework. In: Lopez, J., Huang, X., Sandhu, R. (eds.) NSS 2013. LNCS, vol. 7873, pp. 236\u2013249. Springer, Heidelberg (2013)"},{"key":"60_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/978-3-319-17127-2_3","volume-title":"Risks and Security of Internet and Systems","author":"G Stergiopoulos","year":"2015","unstructured":"Stergiopoulos, G., Katsaros, P., Gritzalis, D.: Automated detection of logical errors in programs. In: Lopez, J., Ray, I., Crispo, B. (eds.) CRiSIS 2014. LNCS, vol. 8924, pp. 35\u201351. Springer, Heidelberg (2015)"},{"key":"60_CR12","unstructured":"The Java PathFinder tool. NASA Ames Research Center. babelfish.arc.nasa.gov\/trac\/jpf\/"},{"key":"60_CR13","doi-asserted-by":"crossref","unstructured":"Doupe, A., Boe, B., Vigna, G.: Fear the EAR: discovering and mitigating execution after redirect vulnerabilities. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 251\u2013262, ACM (2011)","DOI":"10.1145\/2046707.2046736"},{"key":"60_CR14","doi-asserted-by":"crossref","unstructured":"Kuan-Yu, T., Chen, D., Kalbarczyk, Z., Iyer, R.: Characterization of the error resiliency of power grid substation devices. In: 42nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, pp. 1\u20138, 25\u201328 June 2012","DOI":"10.1109\/DSN.2012.6263924"},{"key":"60_CR15","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.scico.2007.01.015","volume":"69","author":"M Ernst","year":"2007","unstructured":"Ernst, M., Perkins, J., Guo, P., McCamant, S., Pacheco, C., Tschantz, M., Xiao, C.: The Daikon system for dynamic detection of likely invariants. Sci. Comput. Program. 69, 35\u201345 (2007)","journal-title":"Sci. Comput. Program."},{"key":"60_CR16","unstructured":"The Daikon invariant detector manual. http:\/\/groups.csail.mit.edu\/pag\/daikon\/"},{"key":"60_CR17","unstructured":"MODBUS4J. http:\/\/sourceforge.net\/projects\/modbus4j\/ . Accessed January 2014"},{"key":"60_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-85617-751-1.00001-X","volume-title":"Programmable logic controllers","author":"W Bolton","year":"2009","unstructured":"Bolton, W.: Programmable Logic Controllers. Elsevier, Amsterdam (2009)"},{"key":"60_CR19","unstructured":"IEEE Standard C37 1994. Definition, Specification and analysis of systems used for supervisory control, data acquisition and automatic control"},{"key":"60_CR20","doi-asserted-by":"crossref","unstructured":"Stouffer, K., Falco, J., Kent, K.: Guide to supervisory control and data acquisition and industrial control systems security. NIST (2008)","DOI":"10.6028\/NIST.SP.800-82e2008"},{"key":"60_CR21","unstructured":"EAR\/Pilar-risk analysis environment. http:\/\/www.ar-tools.com\/en\/index.html"},{"key":"60_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/978-3-642-41476-3_9","volume-title":"Critical Information Infrastructure Security","author":"P Kotzanikolaou","year":"2013","unstructured":"Kotzanikolaou, P., Theoharidou, M., Gritzalis, D.: Interdependencies between critical infrastructures: analyzing the risk of cascading effects. In: Bologna, S., H\u00e4mmerli, B., Gritzalis, D., Wolthusen, S. (eds.) CRITIS 2011. LNCS, vol. 6983, pp. 104\u2013115. Springer, Heidelberg (2013)"},{"issue":"1\/2","key":"60_CR23","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1504\/IJCIS.2013.051606","volume":"9","author":"P Kotzanikolaou","year":"2013","unstructured":"Kotzanikolaou, P., Theoharidou, M., Gritzalis, D.: Assessing n-order dependencies between critical infrastructures. Int. J. Crit. Infrastruct. 9(1\/2), 93\u2013110 (2013)","journal-title":"Int. J. Crit. Infrastruct."},{"key":"60_CR24","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.ress.2012.02.006","volume":"105","author":"G Kj\u00f8lle","year":"2012","unstructured":"Kj\u00f8lle, G., Utne, I., Gjerde, O.: Risk analysis of critical infrastructures emphasizing electricity supply and interdependencies. Reliab. Eng. Syst. Saf. 105, 80\u201389 (2012)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"60_CR25","unstructured":"Oracle Java SE documentation. http:\/\/docs.oracle.com\/ . Accessed 2014"},{"key":"60_CR26","unstructured":"FlowServe L75 series electric actuator. FCD LMAIM7502-00 \u2013 07\/05"},{"key":"60_CR27","unstructured":"PLCSimulator. http:\/\/www.plcsimulator.org\/ . Accessed 2014"},{"key":"60_CR28","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-642-45330-4_12","volume-title":"Critical Infrastructure Protection VII","author":"P Kotzanikolaou","year":"2013","unstructured":"Kotzanikolaou, P., Theoharidou, M., Gritzalis, D.: Cascading effects of common-cause failures on critical infrastructures. In: Butts, J., Shenoi, S. (eds.) Critical Infrastructure Protection VII. IFIP AICT, vol. 417, pp. 171\u2013182. Springer, New York (2013)"},{"issue":"10","key":"60_CR29","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/MC.2012.345","volume":"45","author":"T Boland","year":"2012","unstructured":"Boland, T., Black, P.: Juliet 1.1 C\/C++\u00a0and JAVA test suite. Computer 45(10), 88\u201390 (2012)","journal-title":"Computer"},{"key":"60_CR30","unstructured":"The common weakness enumeration initiative. MITRE Corporation. cwe.mitre.org\/"},{"key":"60_CR31","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.ssci.2013.02.001","volume":"57","author":"C Fan","year":"2013","unstructured":"Fan, C., Yih, S., Tseng, W., Chen, W.: Empirical analysis of software-induced failure events in the nuclear industry. Saf. Sci. 57, 118\u2013128 (2013)","journal-title":"Saf. Sci."},{"key":"60_CR32","doi-asserted-by":"crossref","unstructured":"Soupionis, Y., Benoist, T.: Demo abstract: demonstrating cyber-attacks impact on cyber-physical simulated environment. In: ACM\/IEEE International Conference on Cyber-Physical Systems, p. 222, 14\u201317 April 2014","DOI":"10.1109\/ICCPS.2014.6843735"},{"key":"60_CR33","doi-asserted-by":"crossref","unstructured":"Stergiopoulos, G., Katsaros, P., Gritzalis, D.: Source code profiling and classification for automated detection of logical errors. In: Proceedings of the 3rd International Seminar on Program Verification, Automated Debugging and Symbolic Computation, Germany (2014)","DOI":"10.1007\/978-3-319-17127-2_3"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_60","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T12:24:41Z","timestamp":1748521481000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_60"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_60","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}