{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T10:42:41Z","timestamp":1766486561112,"version":"3.37.3"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020YFB2010900"],"award-info":[{"award-number":["2020YFB2010900"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61833015"],"award-info":[{"award-number":["61833015"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Program for Innovation Leading Scientists and Technicians of Zhongyuan","award":["224200510002"],"award-info":[{"award-number":["224200510002"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2024,3,1]]},"DOI":"10.1109\/jiot.2023.3318988","type":"journal-article","created":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T18:32:47Z","timestamp":1695666767000},"page":"8386-8400","source":"Crossref","is-referenced-by-count":5,"title":["Control Logic Attack Detection and Forensics Through Reverse-Engineering and Verifying PLC Control Applications"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7639-3686","authenticated-orcid":false,"given":"Yangyang","family":"Geng","sequence":"first","affiliation":[{"name":"Information Engineering University, Zhengzhou, China"}]},{"given":"Xin","family":"Che","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4791-6847","authenticated-orcid":false,"given":"Rongkuan","family":"Ma","sequence":"additional","affiliation":[{"name":"Information Engineering University, Zhengzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4891-8657","authenticated-orcid":false,"given":"Qiang","family":"Wei","sequence":"additional","affiliation":[{"name":"Information Engineering University, Zhengzhou, China"}]},{"given":"Mufeng","family":"Wang","sequence":"additional","affiliation":[{"name":"China Industrial Control Systems Cyber Emergency Response Team, Beijing, China"}]},{"given":"Yuqi","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, ShanghaiTech University, Shanghai, China"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/SP.2019.00034"},{"key":"ref2","first-page":"1","article-title":"TRITON: The first ICS cyber attack on safety instrument systems","volume-title":"Proc. Black Hat USA","author":"Di Pinto"},{"volume-title":"US fuel pipeline hackers \u2018didn\u2019t mean to create problems","year":"2021","author":"Russon","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1631\/FITEE.2000546"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/MSP.2011.67"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/COMAPP.2018.8460287"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1007\/978-3-319-72817-9_8"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1007\/978-3-030-22312-0_3"},{"key":"ref9","first-page":"1","article-title":"Internetfacing PLCs\u2013A new back orifice","volume-title":"Proc. Black Hat USA","author":"Klick"},{"key":"ref10","first-page":"1","article-title":"PLC-blaster: A worm living solely in the PLC","volume-title":"Proc. Black Hat Asia","author":"Spenneberg"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/3176258.3176319"},{"volume-title":"A time bomb with fourteen bytes","year":"2011","author":"Langner","key":"ref12"},{"key":"ref13","first-page":"1","article-title":"On dynamic malware payloads aimed at programmable logic controllers","volume-title":"Proc. SENIX Workshop Hot Topics Security (HotSec 11)","author":"McLaughlin"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/2382196.2382244"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.14722\/bar.2019.23074"},{"key":"ref16","first-page":"1","article-title":"Out of control: Ransomware for industrial control systems","volume-title":"Proc. RSA Conf.","author":"Formby"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.14722\/ndss.2014.23043"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/SECON.2017.7925390"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1007\/978-3-030-00018-9_22"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1002\/cpe.5724"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1007\/978-3-030-30215-3_20"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1007\/978-3-030-22038-9_6"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1016\/j.fsidi.2020.301013"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1016\/j.diin.2017.06.012"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.6028\/nist.sp.800-82e2008"},{"volume-title":"Industrial control system","year":"2022","key":"ref26"},{"key":"ref27","volume-title":"IEC 61131-3: Programming Industrial Automation Systems","volume":"166","author":"Tiegelkamp","year":"2010"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/JIOT.2020.3040237"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/JIOT.2022.3200127"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/sp46215.2023.10179411"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1007\/978-3-319-62105-0_3"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/C-M.1978.218136"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1145\/1455770.1455820"},{"key":"ref34","first-page":"1","article-title":"Embedded devices security and firmware reverse engineering","volume-title":"Proc. Black Hat USA","author":"Zaddach"},{"volume-title":"Binwalk","year":"2022","author":"Eacmen","key":"ref35"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.14722\/ndss.2019.23271"},{"key":"ref37","first-page":"165","article-title":"PAtt: Physics-based attestation of control systems","volume-title":"Proc. Int. Symp. Res. Attacks, Intrusions Defenses ({RAID} 2019)","author":"Ghaeini"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10443092\/10261512.pdf?arnumber=10261512","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,8]],"date-time":"2024-03-08T18:55:35Z","timestamp":1709924135000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10261512\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,1]]},"references-count":37,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2023.3318988","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2024,3,1]]}}}