{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T02:14:10Z","timestamp":1730254450899,"version":"3.28.0"},"reference-count":62,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1109\/icphys.2019.8780260","type":"proceedings-article","created":{"date-parts":[[2019,8,2]],"date-time":"2019-08-02T00:19:49Z","timestamp":1564705189000},"page":"73-80","source":"Crossref","is-referenced-by-count":4,"title":["Cybersecurity Analysis of Industrial Control System Functionality"],"prefix":"10.1109","author":[{"given":"Xinxin","family":"Lou","sequence":"first","affiliation":[]},{"given":"Karl","family":"Waedt","sequence":"additional","affiliation":[]},{"given":"Tim","family":"Schurmann","sequence":"additional","affiliation":[]},{"given":"Hauke","family":"Kaufhold","sequence":"additional","affiliation":[]},{"given":"Venesa","family":"Watson","sequence":"additional","affiliation":[]},{"given":"Deeksha","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref39","article-title":"GitHub, 01.06.2016"},{"year":"0","author":"neubecker","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3065913.3065919"},{"year":"2016","key":"ref32","article-title":"SIMATIC S71500 CPU 1518-4 PN\/DP Manual"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICCITechnology.2013.6579516"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23313"},{"year":"2018","key":"ref37","article-title":"SIMATIC S7\/HMI SIMATIC Automation Tool V3.1 SP1 User Guide"},{"year":"0","key":"ref36","article-title":"CVE Details"},{"article-title":"Cyber Security at Civil Nuclear Facilities Understanding the Risks","year":"2015","author":"baylon","key":"ref35"},{"key":"ref34","article-title":"When Firmware Modifications Attack: A Case Study of Embedded Exploitation","author":"cui","year":"2013","journal-title":"NDSS Symposium"},{"year":"0","key":"ref60","article-title":"ICS-CERT, 08.11.2016"},{"year":"0","key":"ref62"},{"year":"0","key":"ref61","article-title":"Cisco Security, 03.03.2015"},{"article-title":"Ghost in the PLC Designing an Undetectable Programmable Logic Controller Rootkit via Pin Control Attack","year":"2017","author":"abbasi","key":"ref28"},{"key":"ref27","first-page":"390","article-title":"A survey on various cyber attacks and their classification","volume":"15","author":"uma","year":"2013","journal-title":"Int J Netw Secur"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433146"},{"article-title":"To Kill a Centrifuge","year":"2013","author":"langner","key":"ref2"},{"year":"0","key":"ref1","article-title":"CNN BUSINESS, 08.06.2018"},{"article-title":"SSA-824231: Unauthenticated Firmware Upload Vulnerability in Desigo PX Controllers","year":"2018","author":"cert","key":"ref20"},{"year":"2017","key":"ref22","article-title":"SIMATIC S7-1500\/ET 200MP Automation system Manual"},{"article-title":"SSA-914382: Denial-of-Service Vulnerability in SIMATIC S7-400","year":"2018","author":"cert","key":"ref21"},{"year":"2017","key":"ref24","article-title":"S7-1500, ET 200SP, ET 200pro Web server"},{"year":"2017","key":"ref23","article-title":"Simple Examples for the Web Server of SIMATIC S7-1200 \/S7-1500"},{"key":"ref26","first-page":"135","article-title":"A System-Fault-Risk Framework for cyber attack classification","volume":"5","author":"ye","year":"2005","journal-title":"Inf Knowl Syst Manag"},{"key":"ref25","article-title":"A Taxonomy of Cyber Attacks on SCADA Systems","author":"bonnie zhu","year":"2011","journal-title":"IEEE CPSCORN"},{"year":"0","key":"ref50","article-title":"CVE Details, 30.08.2018"},{"year":"0","key":"ref51","article-title":"CVE Details, 28.11.2018"},{"key":"ref59","article-title":"Jump-Oriented Programming: A New Class of Code-Reuse Attack","author":"bletsch","year":"2011","journal-title":"ACM ASIACCS &#x2019;11"},{"key":"ref58","article-title":"Runtime Code Reuse Attacks: A Dynamic Framework Bypassing Fine-Grained Address Space Layout Randomization","author":"zhuang","year":"2014","journal-title":"International conference on Software Engineering and Knowledge Engineering"},{"article-title":"Code-Reuse Attacks and Defenses","year":"2015","author":"davi","key":"ref57"},{"key":"ref56","first-page":"439","article-title":"SABOT:specification-based payload generation for programmable logic controllers","author":"mclaughlin","year":"2012","journal-title":"ACM CCS&#x2019;"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346865"},{"article-title":"Industrial Control Systems Dynamic Code Injection","year":"2016","author":"ben aloui","key":"ref54"},{"journal-title":"PLC-Blaster A Worm Living Solely in the PLC","year":"2016","author":"spenneberg","key":"ref53"},{"year":"0","key":"ref52","article-title":"CVE Details, 07.08.2018"},{"key":"ref10","article-title":"Combining Artificial Intelligence planning advantages to assist preliminary formal analysis on ICS cybersecurity vulnerabilities","author":"lou","year":"2018","journal-title":"IEEE ECAI2018"},{"article-title":"Risks People Take and Games People Play","year":"2015","author":"ladkin","key":"ref11"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"article-title":"Causal System Analysis","year":"2001","author":"ladkin","key":"ref12"},{"key":"ref13","article-title":"Chapter 4 An Example of Why-Because Analysis","author":"ladkin","year":"2017","journal-title":"Digital System Safety"},{"key":"ref14","article-title":"Chapter 9 Causal analysis of a pressure tank","author":"ladkin","year":"2001","journal-title":"Causal System Analysis"},{"key":"ref15","article-title":"Chapter 5","author":"ladkin","year":"2017","journal-title":"A Critical-System Assurance Manifesto Issues Arising from IEC 61508"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/363235.363259"},{"key":"ref17","article-title":"Review on firmware","author":"tan","year":"2017","journal-title":"ICIS ACM"},{"article-title":"Firmware Modification Analysis in Programmable Logic Controllers","year":"2014","author":"garcia","key":"ref18"},{"article-title":"SSA-625789: Security Vulnerabilities in Siemens SIMATIC S7-1200 CPU","year":"2011","author":"cert","key":"ref19"},{"article-title":"Defending Against the Dragonfly Cyber Security Attacks","year":"2014","author":"langill","key":"ref4"},{"article-title":"Analysis of the cyber attack on the Ukrainian power grid","year":"2016","author":"lee","key":"ref3"},{"article-title":"CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations","year":"2017","author":"inc","key":"ref6"},{"year":"2014","key":"ref5","article-title":"Energetic Bear-Crouching Yeti"},{"year":"2018","key":"ref8","article-title":"Framework for Improving Critical Infrastructure Cybersecurity-V1.1"},{"year":"2017","key":"ref7","article-title":"TRISIS Malware-Analysis of Safety System Targeted Malware"},{"year":"0","key":"ref49","article-title":"CVE Details, 10.10.2018"},{"key":"ref9","article-title":"Secrets and Lies: Digital Security in a Networked World","volume":"12","author":"schneier","year":"2013"},{"key":"ref46","first-page":"917","article-title":"Covert Channel Using Man-in-the-Middle over HTTPS","author":"johnson","year":"2017","journal-title":"IEEE-CSC on"},{"year":"0","key":"ref45","article-title":"ICS-CERT, 13.11.2018"},{"year":"0","author":"jager","key":"ref48"},{"key":"ref47","first-page":"1","article-title":"Analyzing HTTPS Encrypted Traffic to Identify User Operating System, Browser and Application","author":"muehlstein","year":"2017","journal-title":"IEEE CCNC"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0106"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.12"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2006.244"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/NSWCTC.2010.187"}],"event":{"name":"2019 IEEE International Conference on Industrial Cyber Physical Systems (ICPS)","start":{"date-parts":[[2019,5,6]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2019,5,9]]}},"container-title":["2019 IEEE International Conference on Industrial Cyber Physical Systems (ICPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8767101\/8780112\/08780260.pdf?arnumber=8780260","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:49:28Z","timestamp":1658094568000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8780260\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5]]},"references-count":62,"URL":"https:\/\/doi.org\/10.1109\/icphys.2019.8780260","relation":{},"subject":[],"published":{"date-parts":[[2019,5]]}}}