{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T18:44:56Z","timestamp":1773773096991,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/cns.2015.7346865","type":"proceedings-article","created":{"date-parts":[[2015,12,8]],"date-time":"2015-12-08T22:19:48Z","timestamp":1449613188000},"page":"524-532","source":"Crossref","is-referenced-by-count":36,"title":["Internet-facing PLCs as a network backdoor"],"prefix":"10.1109","author":[{"given":"Johannes","family":"Klick","sequence":"first","affiliation":[]},{"given":"Stephan","family":"Lau","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Marzin","sequence":"additional","affiliation":[]},{"given":"Jan-Ole","family":"Malchow","sequence":"additional","affiliation":[]},{"given":"Volker","family":"Roth","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Project shine: 1, 000,000 internet-connected scada and ics systems and counting","author":"radvanovsky","year":"2013","journal-title":"Tofino Security"},{"key":"ref11","author":"langner","year":"2011","journal-title":"A Time Bomb with Fourteen Bytes"},{"key":"ref12","article-title":"Out of Control: Demonstrating SCADA Exploitation","author":"meixell","year":"2013","journal-title":"Black Hat USA"},{"key":"ref13","article-title":"On dynamic malware payloads aimed at programmable logic controllers","author":"mclaughlin","year":"2011","journal-title":"HOTSEC"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382244"},{"key":"ref15","article-title":"Automation Pyramid (content taken)","year":"0"},{"key":"ref16","article-title":"S7314C-2PN\/DP Technical Details","year":"0"},{"key":"ref17","article-title":"S7&#x2013;300 CPU 31xC and CPU 31x: Technical specifications","author":"mclaughlin","year":"0"},{"key":"ref18","author":"mclaughlin","year":"2011","journal-title":"S7&#x2013;300 Instruction list S7&#x2013;300 CPUs and ET 200 CPUs"},{"key":"ref19","article-title":"S7 Protocol","year":"0"},{"key":"ref4","article-title":"CVE-2012&#x2013;3037","author":"heng","year":"2012"},{"key":"ref3","article-title":"CVE-2014&#x2013;2246","author":"heng","year":"2014"},{"key":"ref6","article-title":"Ics-cert monitor;","author":"cybersecurity","year":"2014"},{"key":"ref5","article-title":"Exploiting Siemens Simatic S7 PLCs;","author":"beresford","year":"2011","journal-title":"Black Hat USA"},{"key":"ref8","article-title":"Alert (ICS-ALERT-12&#x2013;046-01A) Increasing Threat to Industrial Control Systems (Update A)","year":"2012","journal-title":"Industrial Control Systems Cyber Emergency Response Team"},{"key":"ref7","article-title":"Die Lage der IT-Sicherheit in Deutschland 2014","year":"2015","journal-title":"Bundesamt f&#x00FC;r Sicherheit in der Informationstechnik"},{"key":"ref2","article-title":"CVE-2014&#x2013;2908","year":"2014"},{"key":"ref1","article-title":"Industry 4.0 upgrading of germany's industrial capabilities on the horizon","author":"heng","year":"2014","journal-title":"Deutsche Bank Research"},{"key":"ref9","first-page":"2c","author":"malchow","year":"2014","journal-title":"Sicherheit in Vernetzten Systemen 18 DFN Workshop"},{"key":"ref20","article-title":"DotNetSiemensPLCToolBoxLibrary","author":"k\u00fchner","year":"0"},{"key":"ref22","article-title":"PLCinject Tool","author":"marzin","year":"0"},{"key":"ref21","volume":"1 2","year":"2006","journal-title":"System Software for S7&#x2013;300\/400 System and Standard Functions"},{"key":"ref24","article-title":"SOCKS Protocol Version 5","author":"leech","year":"1928","journal-title":"Internet Engineering Task Force"},{"key":"ref23","article-title":"Simple Network Management Protocol (SNMP)","author":"case","year":"1990","journal-title":"Internet Engineering Task Force"}],"event":{"name":"2015 IEEE Conference on Communications and Network Security (CNS)","location":"Florence, Italy","start":{"date-parts":[[2015,9,28]]},"end":{"date-parts":[[2015,9,30]]}},"container-title":["2015 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7336674\/7346791\/07346865.pdf?arnumber=7346865","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T00:30:14Z","timestamp":1490401814000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7346865\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/cns.2015.7346865","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}