{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T16:54:28Z","timestamp":1730220868352,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/etfa.2018.8502660","type":"proceedings-article","created":{"date-parts":[[2018,11,15]],"date-time":"2018-11-15T22:20:08Z","timestamp":1542320408000},"page":"948-955","source":"Crossref","is-referenced-by-count":3,"title":["Runtime Vulnerability Discovery as a Service on Industrial Internet of Things (IIoT) Systems"],"prefix":"10.1109","author":[{"given":"Jose Luis","family":"Flores","sequence":"first","affiliation":[]},{"given":"Imanol","family":"Mugarza","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"151","article-title":"Automated whitebox fuzz testing","volume":"8","author":"godefroid","year":"2008","journal-title":"NDSS"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"20:20","DOI":"10.1145\/2493944.2499552","article-title":"The antifragile organization","volume":"11","author":"tseitlin","year":"2013","journal-title":"Queue"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2017.17"},{"journal-title":"HACKER LEXICON WHAT IS FUZZING?","year":"2016","author":"(wired)","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1292414.1292416"},{"key":"ref15","first-page":"57","article-title":"Identifying vulnerabilities in scada systems via fuzz-testing","author":"shapiro","year":"2011","journal-title":"International Conference on Critical Infrastructure Protection"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2015.7301400"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2015.7293376"},{"journal-title":"Dont fuss about fuzzing Fuzzing controllers in vehicular networks","year":"0","author":"bayer","key":"ref18"},{"key":"ref19","article-title":"Security crash test-practical security evaluations of automotive onboard it components","author":"bayer","year":"2015","journal-title":"Automotive-Safety & Security 2014"},{"journal-title":"Die lage der it-sicherheit in deutschland 2014","year":"2014","key":"ref4"},{"journal-title":"AP Investigation US Power Grid Vulnerable to Foreign Hacks","year":"2010","author":"team","key":"ref3"},{"journal-title":"Industrial communication networks Network and system security 62443","year":"2010","key":"ref6"},{"journal-title":"Secrets & lies Digital security in a networked world john wiley & sons","year":"2000","author":"schneier","key":"ref5"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"20:20","DOI":"10.1145\/2090147.2094081","article-title":"Sage: Whitebox fuzzing for security testing","volume":"10","author":"godefroid","year":"2012","journal-title":"Queue"},{"journal-title":"Fuzzing for Software Security Testing and Quality Assurance","year":"2008","author":"takanen","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606558"},{"journal-title":"Renault Nissan European operations deal with global cyber attack","year":"2017","author":"mathieu","key":"ref1"},{"key":"ref20","article-title":"Fuzzing the phone in your phone","author":"mulliner","year":"2009","journal-title":"Black Hat USA"},{"journal-title":"The Definitive Guide to the Xen Hypervisor","year":"2008","author":"chisnall","key":"ref22"},{"key":"ref21","first-page":"1","article-title":"Standardizing cyber threat intelligence information with the structured threat information expression (stix)","volume":"11","author":"barnum","year":"2012","journal-title":"MITRE Corporation"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SIES.2014.6871203"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/RTCSA.2010.38"},{"journal-title":"The Docker Book Containerization is the new virtualization James Turnbull","year":"2014","author":"turnbull","key":"ref25"}],"event":{"name":"2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA)","start":{"date-parts":[[2018,9,4]]},"location":"Turin","end":{"date-parts":[[2018,9,7]]}},"container-title":["2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8488382\/8502441\/08502660.pdf?arnumber=8502660","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T12:58:31Z","timestamp":1643201911000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8502660\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/etfa.2018.8502660","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}