{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T02:07:09Z","timestamp":1773194829833,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006168","name":"National Nuclear Security Administration","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006168","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/acsacw69556.2025.00009","type":"proceedings-article","created":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T19:56:13Z","timestamp":1773086173000},"page":"15-27","source":"Crossref","is-referenced-by-count":0,"title":["CYPHER: Adaptive Cyber\u2013Physical Fuzzing for ICS Security"],"prefix":"10.1109","author":[{"given":"Stacy A.","family":"Willson","sequence":"first","affiliation":[{"name":"The University of Texas at San Antonio,Electrical and Computer Engineering,San Antonio,United States"}]},{"given":"Qian","family":"Chen","sequence":"additional","affiliation":[{"name":"The University of Texas at San Antonio,Electrical and Computer Engineering,San Antonio,United States"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Security for EtherNet\/IP is provided by CIP Security profiles (TLS\/DTLS) when enabled"},{"key":"ref2","volume-title":"Logix 5000 Controllers: Data Access, Rockwell Automation, documents Read Tag \/ Write Tag services for controller tags over EtherNet\/IP"},{"key":"ref3","first-page":"5584821","article-title":"A novel generative adversarial network-based fuzzing cases generation method for industrial control system protocols","volume":"2021","author":"Sun","year":"2021","journal-title":"Security and Communication Networks"},{"key":"ref4","first-page":"1529","article-title":"Ics3fuzzer: State-aware ics fuzzing for discovering protocol implementation bugs","volume-title":"USENIX Security Symposium","author":"Zhang"},{"key":"ref5","first-page":"2831","article-title":"Deltafuzz: Fuzzing industrial control protocols via delta-state mutation","volume-title":"USENIX Security Symposium","author":"Yoon"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3564633"},{"issue":"4","key":"ref7","first-page":"1","article-title":"Machine learning in industrial control system (ics) security: Current landscape, opportunities and challenges","volume":"26","author":"Koay","year":"2023","journal-title":"ACM Transactions on Privacy and Security"},{"key":"ref8","first-page":"108487","article-title":"Model-based ids design for icss using hybrid automata","volume":"223","author":"Monzer","year":"2022","journal-title":"Reliability Engineering & System Safety"},{"key":"ref9","first-page":"227","article-title":"Ics cyber attack detection with ensemble machine learning and dpi using cyber-kit datasets","volume-title":"IEEE Conference on Communications and Network Security (CNS)","author":"Zhang"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1145\/3564625.3564633","article-title":"Assessing model-free anomaly detection in industrial control systems against generic concealment attacks","volume-title":"Annual Computer Security Applications Conference (ACSAC)","author":"Erba"},{"key":"ref11","article-title":"Attributions for ml-based ics anomaly detection: From theory to practice","volume-title":"Network and Distributed System Security Symposium (NDSS)","author":"W\u0142odarski"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-023-00162-z"},{"key":"ref13","article-title":"Process-aware security monitoring in industrial control systems: A survey","volume-title":"Annual Reviews in Control (Elsevier)","author":"Martorella","year":"2024"},{"key":"ref14","first-page":"113 543","article-title":"Multi-source multi-domain data fusion for cyberattack detection in power systems","volume":"9","author":"Kim","year":"2021","journal-title":"IEEE Access"},{"issue":"23","key":"ref15","first-page":"7957","article-title":"Deep learning-based cyber\u2013physical feature fusion for anomaly detection in industrial control systems","volume":"21","author":"Feng","year":"2021","journal-title":"Sensors"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-023-05764-5"},{"key":"ref17","article-title":"Sepanner: Semantic field recovery for industrial control systems","volume-title":"Annual Computer Security Applications Conference (ACSAC)","author":"He"},{"key":"ref18","article-title":"Ipspex: Industrial protocol specification extraction for cybersecurity","volume-title":"Applied Cryptography and Network Security (ACNS)","author":"Yun","year":"2022"},{"key":"ref19","first-page":"2809","article-title":"Charon: An industrial control system security evaluation framework with cross-state fuzzing","volume-title":"USENIX Security Symposium","author":"Huang"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690216"},{"key":"ref21","article-title":"Icspfuzzer: Grey-box protocol-structure aware fuzzing for industrial control protocols","volume-title":"International Conference on Wireless Algorithms, Systems, and Applications (WASA)","author":"Zhang"},{"key":"ref22","article-title":"Binary fuzzing of proprietary industrial protocols in the field","volume-title":"International Symposium on Research in Attacks, Intrusions and Defenses (RAID)","author":"Lin"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2025.240795"},{"key":"ref24","article-title":"Fuzzing an industrial proprietary protocol","volume-title":"Formal Methods for Industrial Critical Systems (FMICS)","volume":"14952","author":"Dong","year":"2024"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2024.104020"},{"key":"ref26","article-title":"Stateful fuzzing of opc ua for security and robustness evaluation","volume-title":"IEEE Symposium on Security and Privacy (S&P)","author":"Huang"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SysCon53073.2023.10131048"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.conengprac.2024.106164"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3389\/frai.2024.1508821"},{"key":"ref30","doi-asserted-by":"crossref","DOI":"10.1145\/3735948.3736158","volume-title":"Adversarial sample generation for anomaly detection in industrial control systems","author":"Mustafa","year":"2025"}],"event":{"name":"2025 Annual Computer Security Applications Conference Workshops (ACSAC Workshops)","location":"Honolulu, HI, USA","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,9]]}},"container-title":["2025 Annual Computer Security Applications Conference Workshops (ACSAC Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11417955\/11417996\/11418066.pdf?arnumber=11418066","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T05:29:10Z","timestamp":1773120550000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11418066\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/acsacw69556.2025.00009","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}