{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T06:10:36Z","timestamp":1759990236502,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319713670"},{"type":"electronic","value":"9783319713687"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71368-7_1","type":"book-chapter","created":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T07:22:30Z","timestamp":1511248950000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Stealth Low-Level Manipulation of Programmable Logic Controllers I\/O by Pin Control Exploitation"],"prefix":"10.1007","author":[{"given":"Ali","family":"Abbasi","sequence":"first","affiliation":[]},{"given":"Majid","family":"Hashemi","sequence":"additional","affiliation":[]},{"given":"Emmanuele","family":"Zambon","sequence":"additional","affiliation":[]},{"given":"Sandro","family":"Etalle","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,22]]},"reference":[{"key":"1_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1007\/978-3-319-11379-1_19","volume-title":"Research in Attacks, Intrusions and Defenses","author":"A Abbasi","year":"2014","unstructured":"Abbasi, A., Wetzels, J., Bokslag, W., Zambon, E., Etalle, S.: On emulation-based network intrusion detection systems. In: Stavrou, A., Bos, H., Portokalidis, G. (eds.) RAID 2014. LNCS, vol. 8688, pp. 384\u2013404. Springer, Cham (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-319-11379-1_19"},{"issue":"2","key":"1_CR2","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1016\/j.ijcip.2013.04.004","volume":"6","author":"Z Basnight","year":"2013","unstructured":"Basnight, Z., Butts, J., Lopez Jr., J., Dube, T.: Firmware modification attacks on programmable logic controllers. Int. J. Crit. Infrastruct. Prot. 6(2), 76\u201384 (2013)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"1_CR3","unstructured":"Beresford, D.: Exploiting siemens simatic S7 PLCs. In: Black Hat USA (2011)"},{"key":"1_CR4","unstructured":"Beresford, D., Abbasi, A.: Project IRUS: multifaceted approach to attacking and defending ICS. In: SCADA Security Scientific Symposium (S4) (2013)"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1007\/978-3-642-23644-0_19","volume-title":"Recent Advances in Intrusion Detection","author":"A Cui","year":"2011","unstructured":"Cui, A., Stolfo, S.J.: Defending embedded systems with software symbiotes. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol. 6961, pp. 358\u2013377. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-23644-0_19"},{"key":"1_CR6","unstructured":"DigitalBond: 3S CoDeSys, Project Basecamp (2012). \nhttp:\/\/www.digitalbond.com\/tools\/basecamp\/3s-codesys\/"},{"issue":"12","key":"1_CR7","doi-asserted-by":"crossref","first-page":"1590","DOI":"10.1002\/sec.166","volume":"6","author":"S Embleton","year":"2013","unstructured":"Embleton, S., Sparks, S., Zou, C.C.: SMM rootkit: a new breed of os independent malware. Secur. Commun. Netw. 6(12), 1590\u20131605 (2013)","journal-title":"Secur. Commun. Netw."},{"key":"1_CR8","unstructured":"Falliere, N., Murchu, L.O., Chien, E.: W32. stuxnet dossier. White paper, Symantec Corp., Security Response 5 (2011)"},{"key":"1_CR9","unstructured":"ICS-CERT: Abb ac500 plc webserver codesys vulnerability (2013). \nhttps:\/\/ics-cert.us-cert.gov\/advisories\/ICSA-12-320-01"},{"key":"1_CR10","unstructured":"ICS-CERT: Schneider electric modicon quantum vulnerabilities (update b) (2014). \nhttps:\/\/ics-cert.us-cert.gov\/alerts\/ICS-ALERT-12-020-03B"},{"key":"1_CR11","unstructured":"ICS-CERT: Schneider electric modicon m340 buffer overflow vulnerability (2015). \nhttps:\/\/ics-cert.us-cert.gov\/advisories\/ICSA-15-351-01"},{"key":"1_CR12","unstructured":"ICS-CERT: Rockwell automation micrologix 1100 plc overflow vulnerability (2016). \nhttps:\/\/ics-cert.us-cert.gov\/advisories\/ICSA-16-026-02"},{"issue":"7","key":"1_CR13","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1016\/j.cose.2006.03.001","volume":"25","author":"VM Igure","year":"2006","unstructured":"Igure, V.M., Laughter, S.A., Williams, R.D.: Security issues in SCADA networks. Comput. Secur. 25(7), 498\u2013506 (2006)","journal-title":"Comput. Secur."},{"issue":"7","key":"1_CR14","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1109\/MC.2004.52","volume":"37","author":"P Koopman","year":"2004","unstructured":"Koopman, P.: Embedded system security. Computer 37(7), 95\u201397 (2004)","journal-title":"Computer"},{"key":"1_CR15","unstructured":"Langner, R.: To kill a centrifuge: A technical analysis of what stuxnets creators tried to achieve (2013). \nhttp:\/\/www.langner.com\/en\/wp-content\/uploads\/2013\/11\/To-kill-a-centrifuge.pdf"},{"key":"1_CR16","unstructured":"Larsen, J.: Physical damage 101: bread and butter attacks. In: Black Hat USA (2015)"},{"key":"1_CR17","unstructured":"Liang, Z., Yin, H., Song, D.: HookFinder: identifying and understanding malware hooking behaviors. In: Proceeding of the 15th Annual Network and Distributed System Security Symposium (NDSS 2008) (2008). \nhttp:\/\/bitblaze.cs.berkeley.edu\/papers\/hookfinder_ndss08.pdf"},{"issue":"1","key":"1_CR18","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1109\/TDSC.2007.70216","volume":"6","author":"TC Maxino","year":"2009","unstructured":"Maxino, T.C., Koopman, P.J.: The effectiveness of checksums for embedded control networks. IEEE Trans. Dependable Secure Comput. 6(1), 59\u201372 (2009)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"McLaughlin, S., McDaniel, P.: SABOT: specification-based payload generation for programmable logic controllers. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012, pp. 439\u2013449. ACM, New York (2012)","DOI":"10.1145\/2382196.2382244"},{"key":"1_CR20","unstructured":"McLaughlin, S.E.: On dynamic malware payloads aimed at programmable logic controllers. In: HotSec (2011)"},{"key":"1_CR21","unstructured":"Peck, D., Peterson, D.: Leveraging ethernet card vulnerabilities in field devices. In: SCADA Security Scientific Symposium, pp. 1\u201319 (2009)"},{"key":"1_CR22","unstructured":"PREEMPTIVE-Consortium: Reference taxonomy on industrial control systems networks for utilities (2014). \nhttp:\/\/preemptive.eu\/wp-content\/uploads\/2015\/07\/preemptive_deliverable-d2.3.pdf"},{"issue":"2","key":"1_CR23","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.ijcip.2012.02.002","volume":"5","author":"J Reeves","year":"2012","unstructured":"Reeves, J., Ramaswamy, A., Locasto, M., Bratus, S., Smith, S.: Intrusion detection for resource-constrained embedded control systems in the power grid. Int. J. Crit. Infrastruct. Prot. 5(2), 74\u201383 (2012)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Schiffman, J., Kaplan, D.: The smm rootkit revisited: fun with USB. In: 9th International Conference on Availability, Reliability and Security (ARES), pp. 279\u2013286 (2014)","DOI":"10.1109\/ARES.2014.44"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Sparks, S., Embleton, S., Zou, C.C.: A chipset level network backdoor: bypassing host-based firewall & IDS. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, pp. 125\u2013134. ACM (2009)","DOI":"10.1145\/1533057.1533076"},{"key":"1_CR26","unstructured":"Spenneberg, R., Br\u00fcggemann, M., Schwartke, H.: PLC-blaster: a worm living solely in the PLC. In: Black Hat Asia (2016)"},{"key":"1_CR27","unstructured":"Wightman, R.: Project basecamp at s4. SCADA Security Scientific Symposium (2012). \nhttps:\/\/www.digitalbond.com\/tools\/basecamp\/schneider-modicon-quantum\/"},{"key":"1_CR28","unstructured":"Wrightman, K.R.: Vulnerability inheritance in PLCs. DEFCON 23 IoT Village (2015)"},{"key":"1_CR29","doi-asserted-by":"publisher","unstructured":"Yin, H., Song, D.: Hooking behavior analysis. In: Automatic Malware Analysis, pp. 43\u201358. Springer, New York (2013). \nhttps:\/\/doi.org\/10.1007\/978-1-4614-5523-3_5","DOI":"10.1007\/978-1-4614-5523-3_5"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71368-7_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,31]],"date-time":"2018-01-31T22:27:38Z","timestamp":1517437658000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71368-7_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319713670","9783319713687"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71368-7_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}