{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T20:08:15Z","timestamp":1778789295632,"version":"3.51.4"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319728162","type":"print"},{"value":"9783319728179","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,12,22]],"date-time":"2017-12-22T00:00:00Z","timestamp":1513900800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-72817-9_8","type":"book-chapter","created":{"date-parts":[[2017,12,21]],"date-time":"2017-12-21T11:44:29Z","timestamp":1513856669000},"page":"110-126","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":45,"title":["On Ladder Logic Bombs in Industrial Control Systems"],"prefix":"10.1007","author":[{"given":"Naman","family":"Govil","sequence":"first","affiliation":[]},{"given":"Anand","family":"Agrawal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8424-2602","authenticated-orcid":false,"given":"Nils Ole","family":"Tippenhauer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,22]]},"reference":[{"key":"8_CR1","unstructured":"Beresford, D.: Exploiting Siemens Simatic S7 PLCs. In: Proceedings of Black Hat USA (2011)"},{"key":"8_CR2","unstructured":"C\u00e1rdenas, A.A., Amin, S., Sastry, S.: Research challenges for the security of control systems. In: Proceedings of USENIX Workshop on Hot Topics in Security (HotSec) (2008)"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Caselli, M., Zambon, E., Kargl, F.: Sequence-aware intrusion detection in industrial control systems. In: Proceedings of the Workshop on Cyber-Physical System Security (CPSS), pp. 13\u201324. ACM (2015)","DOI":"10.1145\/2732198.2732200"},{"key":"8_CR4","unstructured":"Chabukswar, R., Sin\u00f3poli, B., Karsai, G., Giani, A., Neema, H., Davis, A.: Simulation of network attacks on SCADA systems. In: Proceedings of Workshop on Secure Control Systems (2010)"},{"key":"8_CR5","unstructured":"Falliere, N., Murchu, L.O., Chien, E.: W32.Stuxnet dossier"},{"issue":"2","key":"8_CR6","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1016\/j.ijcip.2013.05.001","volume":"6","author":"N Goldenberg","year":"2013","unstructured":"Goldenberg, N., Wool, A.: Accurate modeling of Modbus\/TCP for intrusion detection in SCADA systems. Int. J. Crit. Infrastruct. Prot. 6(2), 63\u201375 (2013)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"8_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12015-2","volume-title":"IEC 61131\u20133: Programming Industrial Automation Systems: Concepts and Programming Languages, Requirements for Programming Systems, Decision-Making Aids","author":"KH John","year":"2010","unstructured":"John, K.H., Tiegelkamp, M.: IEC 61131\u20133: Programming Industrial Automation Systems: Concepts and Programming Languages, Requirements for Programming Systems, Decision-Making Aids, 2nd edn. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-12015-2","edition":"2"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Karnouskos, S.: Stuxnet worm impact on industrial cyber-physical system security. In: Proceedings of Conference on Industrial Electronics Society (IECON), pp. 4490\u20134494. IEEE (2011)","DOI":"10.1109\/IECON.2011.6120048"},{"key":"8_CR9","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1016\/j.anucene.2013.10.039","volume":"65","author":"D-Y Kim","year":"2014","unstructured":"Kim, D.-Y.: Cyber security issues imposed on nuclear power plants. Ann. Nucl. Energy 65, 141\u2013143 (2014)","journal-title":"Ann. Nucl. Energy"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Kim, G.H., Spafford, E.H.: The design and implementation of tripwire: a file system integrity checker. In: Proceedings of the Conference on Computer and Communications Security (CCS), pp. 18\u201329. ACM (1994)","DOI":"10.1145\/191177.191183"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Kosut, O., Jia, L., Thomas, R., Tong, L.: Malicious data attacks on smart grid state estimation: attack strategies and countermeasures. In: Proceedings of the IEEE Conference on Smart Grid Communications (SmartGridComm), pp. 220\u2013225, October 2010","DOI":"10.1109\/SMARTGRID.2010.5622045"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Krotofil, M., C\u00e1rdenas, A.A., Manning, B., Larsen, J.: CPS: driving cyber-physical systems to unsafe operating conditions by timing DoS attacks on sensor signals. In: Proceedings of the Conference on Annual Computer Security Applications Conference (ACSAC), pp. 146\u2013155. ACM (2014)","DOI":"10.1145\/2664243.2664290"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Lin, J., Yu, W., Yang, X., Xu, G., Zhao, W.: On false data injection attacks against distributed energy routing in smart grid. In: Proceedings of Conference on Cyber-Physical Systems (ICCPS) (2012)","DOI":"10.1109\/ICCPS.2012.26"},{"issue":"1","key":"8_CR14","first-page":"13","volume":"14","author":"Y Liu","year":"2011","unstructured":"Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1), 13 (2011)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"8_CR15","unstructured":"McLaughlin, S.: On dynamic malware payloads aimed at programmable logic controllers. In: Proceedings of USENIX Conference on Hot Topics in Security (HotSec), p. 10, August 2013"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"McLaughlin, S., McDaniel, P.: SABOT: specification-based payload generation for programmable logic controllers. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), pp. 439\u2013449. ACM (2012)","DOI":"10.1145\/2382196.2382244"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"McLaughlin, S.E., Zonouz, S.A., Pohly, D.J., McDaniel, P.D.: A trusted safety verifier for process controller code. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (2014)","DOI":"10.14722\/ndss.2014.23043"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Milinkovic, S.A., Lazic, L.R.: Industrial PLC security issues. In: Proceedings of Conference on Telecommunications Forum (TELFOR), pp. 1536\u20131539. IEEE (2012)","DOI":"10.1109\/TELFOR.2012.6419513"},{"key":"8_CR19","unstructured":"Morris, T.H., Gao, W.: Industrial control system cyber attacks. In: Proceedings of the Symposium for ICS and SCADA Cyber Security Research (ICS-CSR). BCS Learning and Development Ltd. (2013)"},{"key":"8_CR20","unstructured":"Pollet, J.: Electricity for free? The dirty underbelly of SCADA and smart meters. In: Proceedings of Black Hat USA (2010)"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Wang, E., Ye, Y., Xu, X., Yiu, S., Hui, L., Chow, K.: Security issues and challenges for cyber physical system. In: Proceedings of Conference on Cyber, Physical and Social Computing (CPSCom), pp. 733\u2013738, December 2010","DOI":"10.1109\/GreenCom-CPSCom.2010.36"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Zhu, B., Joseph, A., Sastry, S.: A taxonomy of cyber attacks on SCADA systems. In: Proceedings of Conference on Cyber, Physical and Social Computing (CPSCom), pp. 380\u2013388 (2011)","DOI":"10.1109\/iThings\/CPSCom.2011.34"},{"issue":"4","key":"8_CR23","doi-asserted-by":"crossref","first-page":"1790","DOI":"10.1109\/TSG.2012.2217762","volume":"3","author":"S Zonouz","year":"2012","unstructured":"Zonouz, S., Rogers, K., Berthier, R., Bobba, R., Sanders, W., Overbye, T.: SCPSE: security-oriented cyber-physical state estimation for power grid critical infrastructures. IEEE Trans. Smart Grid 3(4), 1790\u20131799 (2012)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"6","key":"8_CR24","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MSP.2014.113","volume":"12","author":"S Zonouz","year":"2014","unstructured":"Zonouz, S., Rrushi, J., McLaughlin, S.: Detecting industrial control malware using automated PLC code analytics. IEEE Secur. Priv. 12(6), 40\u201347 (2014)","journal-title":"IEEE Secur. Priv."}],"container-title":["Lecture Notes in Computer Science","Computer Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72817-9_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T07:45:07Z","timestamp":1570520707000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72817-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,22]]},"ISBN":["9783319728162","9783319728179"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72817-9_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,12,22]]}}}