{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:15:22Z","timestamp":1729635322911,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,1]]},"DOI":"10.1109\/isgt.2012.6175814","type":"proceedings-article","created":{"date-parts":[[2012,4,5]],"date-time":"2012-04-05T13:59:45Z","timestamp":1333634385000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["Automated vulnerability detection for compiled smart grid software"],"prefix":"10.1109","author":[{"given":"S. J.","family":"Prowell","sequence":"first","affiliation":[]},{"given":"M.","family":"Pleszkoch","sequence":"additional","affiliation":[]},{"given":"K. D.","family":"Sayre","sequence":"additional","affiliation":[]},{"given":"R. C.","family":"Linger","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.32"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2012.128"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/32.120314"},{"volume":"2 a","journal-title":"Intel 64 and IA-32 architectures software developer's manual","year":"2011","key":"18"},{"key":"15","article-title":"Advanced Metering Infrastructure Attack Methodology","author":"carpenter","year":"2009","journal-title":"Guardians White Paper"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(03)00241-3"},{"key":"13","doi-asserted-by":"crossref","DOI":"10.1145\/1713254.1713257","article-title":"Cloud 9: A Software Testing Service","volume":"43","author":"ciortea","year":"2010","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"journal-title":"The trace assertion method of module interface specification","year":"1989","author":"parnas","key":"11"},{"key":"12","first-page":"179","article-title":"Static Detection of Security Vulnerabilities in Scripting Languages","author":"xie","year":"2006","journal-title":"Proceedings of the 15th USENIX Security Symposium"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010248"},{"journal-title":"Structured Programming Theory and Practice","year":"1979","author":"linger","key":"3"},{"key":"20","article-title":"Automatically Generating Loop Invariants Using Quantifier Elimination (Preliminary Report)","author":"kapur","year":"0","journal-title":"Proceedings of Applications of Computer Algebra (ACA-2004) Beaumont Texas July 2004"},{"journal-title":"Cleanroom Software Engineering Technology and Process","year":"1999","author":"prowell","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-322-96753-4"},{"journal-title":"Roadmap to Achieve Energy Delivery Systems Cybersecurity","year":"2011","key":"10"},{"key":"7","article-title":"Computational Security Attribute Analysis","author":"walton","year":"2008","journal-title":"CERT Research Annual Report"},{"key":"6","article-title":"Applying Function Extraction Techniques to Reverse Engineer Virtual Machines","author":"pleszkoch","year":"2009","journal-title":"CERT Research Annual Report"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139172752","author":"baader","year":"1998","journal-title":"Term Rewriting and All That"},{"journal-title":"A Practical Introduction to Denotational Semantics","year":"1986","author":"allison","key":"4"},{"journal-title":"The CERT function extraction experiment Quantifying FX impact on software comprehension and verification","year":"2005","author":"collins","key":"9"},{"key":"8","article-title":"Computational Security Attributes","author":"walton","year":"2009","journal-title":"Proceedings of 42nd Hawaii International Conference on System Sciences (HICSS-42)"}],"event":{"name":"2012 IEEE PES Innovative Smart Grid Technologies (ISGT)","start":{"date-parts":[[2012,1,16]]},"location":"Washington, DC, USA","end":{"date-parts":[[2012,1,20]]}},"container-title":["2012 IEEE PES Innovative Smart Grid Technologies (ISGT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6170475\/6175527\/06175814.pdf?arnumber=6175814","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,26]],"date-time":"2019-06-26T20:08:47Z","timestamp":1561579727000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6175814\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/isgt.2012.6175814","relation":{},"subject":[],"published":{"date-parts":[[2012,1]]}}}