{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T17:44:01Z","timestamp":1744998241965},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642336744"},{"type":"electronic","value":"9783642336751"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33675-1_31","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T16:33:04Z","timestamp":1347294784000},"page":"347-356","source":"Crossref","is-referenced-by-count":11,"title":["The Cyber-Physical Attacker"],"prefix":"10.1007","author":[{"given":"Roberto","family":"Vigo","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","unstructured":"Anand, M., Cronin, E., Sherr, M., Blaze, M., Ives, Z., Lee, I.: Security Challenges in Next Generation Cyber Physical Systems. In: Beyond SCADA: Cyber Physical Systems Meeting, HCSS-NEC4CPS (2006)"},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"Anand, M., Ives, Z., Lee, I.: Quantifying Eavesdropping Vulnerability in Sensor Networks. In: 2nd VLDB Workshop on Data Management for Sensor Networks, DMSN (2005)","DOI":"10.1145\/1080885.1080887"},{"issue":"2","key":"31_CR3","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1145\/2019599.2019601","volume":"14","author":"D. Basin","year":"2011","unstructured":"Basin, D., Capkun, S., Schaller, P., Schmidt, B.: Formal Reasoning about Physical Properties of Security Protocols. ACM Transactions on Information and System Security (TISSEC)\u00a014(2), 16 (2011)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"31_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-15205-4_1","volume-title":"Computer Science Logic","author":"D. Basin","year":"2010","unstructured":"Basin, D., Cremers, C.: Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries. In: Dawar, A., Veith, H. (eds.) CSL 2010. LNCS, vol.\u00a06247, pp. 1\u201318. Springer, Heidelberg (2010)"},{"key":"31_CR5","unstructured":"Benenson, Z., Cholewinski, P., Freiling, F.: Vulnerabilities and attacks in wireless sensor networks. In: Lopez, J., Zhou, J. (eds.) Wireless Sensors Networks Security. IOS Press (2007)"},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"Benenson, Z., Dewald, A., Freiling, F.: Presence, Intervention, Insertion: Unifying Attack and Failure Models in Wireless Sensor Networks. Technical report, University of Mannheim (2009)","DOI":"10.1524\/itit.2010.0609"},{"issue":"4","key":"31_CR7","doi-asserted-by":"crossref","first-page":"363","DOI":"10.3233\/JCS-2009-0339","volume":"17","author":"B. Blanchet","year":"2009","unstructured":"Blanchet, B.: Automatic verification of correspondences for security protocols. Journal of Computer Security\u00a017(4), 363\u2013434 (2009)","journal-title":"Journal of Computer Security"},{"issue":"3-4","key":"31_CR8","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/s10207-004-0036-x","volume":"2","author":"M. Buchholtz","year":"2004","unstructured":"Buchholtz, M., Nielson, H.R., Nielson, F.: A Calculus for Control Flow Analysis of Security Protocols. International Journal of Information Security\u00a02(3-4), 145\u2013167 (2004)","journal-title":"International Journal of Information Security"},{"key":"31_CR9","unstructured":"Burmester, M., Magkos, E.: Modeling Security in Cyber-Physical Systems. In: Sixth Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection (2012)"},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"C\u00e1rdenas, A., Amin, S., Sastry, S.: Secure Control: Towards Survivable Cyber-Physical Systems. In: 28th International Conference on Distributed Computing Systems, ICDCS 2008 Workshops (2008)","DOI":"10.1109\/ICDCS.Workshops.2008.40"},{"key":"31_CR11","unstructured":"C\u00e1rdenas, A., Amin, S., Sinopoli, B., Giani, A., Perrig, A., Sastry, S.: Challenges for Securing Cyber Physical Systems. In: Workshop on Future Directions in Cyber-physical Systems Security (2009)"},{"key":"31_CR12","series-title":"CCIS","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/978-3-642-30567-2_24","volume-title":"Networked Digital Technologies","author":"A. Mauro Di","year":"2012","unstructured":"Di Mauro, A., Papini, D., Vigo, R., Dragoni, N.: Toward a Threat Model for Energy-Harvesting Wireless Sensor Networks. In: Benlamri, R. (ed.) NDT 2012, Part II. CCIS, vol.\u00a0294, pp. 289\u2013301. Springer, Heidelberg (2012)"},{"key":"31_CR13","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/0196-6774(82)90004-9","volume":"30","author":"D. Dolev","year":"1982","unstructured":"Dolev, D.: The Byzantine generals strike again. Journal of Algorithms\u00a030, 14\u201330 (1982)","journal-title":"Journal of Algorithms"},{"issue":"2","key":"31_CR14","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Transactions on Information Theory\u00a029(2), 198\u2013208 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"key":"31_CR15","doi-asserted-by":"crossref","unstructured":"Gamage, T.T., McMillin, B.M., Roth, T.P.: Enforcing Information Flow Security Properties in Cyber-Physical Systems: A Generalized Framework Based on Compensation. In: 34th Annual Computer Software and Applications Conference Workshops, IEEE COMPSACW 2010 (2010)","DOI":"10.1109\/COMPSACW.2010.36"},{"key":"31_CR16","doi-asserted-by":"crossref","unstructured":"Gamage, T.T., Roth, T.P., McMillin, B.M.: Confidentiality Preserving Security Properties for Cyber-Physical Systems. In: 35th IEEE Annual Computer Software and Applications Conference (2011)","DOI":"10.1109\/COMPSAC.2011.13"},{"key":"31_CR17","doi-asserted-by":"crossref","unstructured":"Goldwasser, S., Micali, S., Rivest, R.L.: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM J. Comput. 17(2) (1988)","DOI":"10.1137\/0217017"},{"key":"31_CR18","doi-asserted-by":"crossref","unstructured":"Lee, E.A.: Cyber Physical Systems: Design Challenges. In: International Symposium on Object\/Component\/Service-Oriented Real-Time Distributed Computing, ISORC (2008)","DOI":"10.1109\/ISORC.2008.25"},{"key":"31_CR19","unstructured":"Neuman, C.: Challenges in Security for Cyber-Physical Systems. In: DHS Workshop on Future Directions in Cyber-Physical Systems Security (2009)"},{"key":"31_CR20","doi-asserted-by":"crossref","unstructured":"Shi, J., Wan, J., Yan, H., Suo, H.: A Survey of Cyber Physical Systems. In: International Conference on Wireless Communications and Signal Processing, WSCP 2011 (2011)","DOI":"10.1109\/WCSP.2011.6096958"},{"key":"31_CR21","doi-asserted-by":"crossref","unstructured":"Xiao, K., Ren, S., Kwiat, K.: Retrofitting Cyber Physical Systems for Survivability through External Coordination. In: 41st Hawaii International Conference on System Sciences (2008)","DOI":"10.1109\/HICSS.2008.377"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33675-1_31.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:18:28Z","timestamp":1620130708000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33675-1_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642336744","9783642336751"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33675-1_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}