{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T23:24:20Z","timestamp":1778628260386,"version":"3.51.4"},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"European Union\u2019s Horizon 2020 Research and Innovation Programme","award":["739551"],"award-info":[{"award-number":["739551"]}]},{"name":"Republic of Cyprus through the Deputy Ministry of Research, Innovation and Digital Policy"},{"DOI":"10.13039\/100018703","name":"EU Horizon Europe COoperative Cyber prOtectiON for Modern Power Grids (COCOON) Project","doi-asserted-by":"publisher","award":["101120221"],"award-info":[{"award-number":["101120221"]}],"id":[{"id":"10.13039\/100018703","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tifs.2023.3340615","type":"journal-article","created":{"date-parts":[[2023,12,7]],"date-time":"2023-12-07T19:20:57Z","timestamp":1701976857000},"page":"1660-1671","source":"Crossref","is-referenced-by-count":9,"title":["Sizzler: Sequential Fuzzing in Ladder Diagrams for Vulnerability Detection and Discovery in Programmable Logic Controllers"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-9574-9812","authenticated-orcid":false,"given":"Kai","family":"Feng","sequence":"first","affiliation":[{"name":"School of Computing Science, University of Glasgow, Glasgow, Scotland, U.K."}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5232-2381","authenticated-orcid":false,"given":"Marco M.","family":"Cook","sequence":"additional","affiliation":[{"name":"School of Computing Science, University of Glasgow, Glasgow, Scotland, U.K."}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7996-6216","authenticated-orcid":false,"given":"Angelos K.","family":"Marnerides","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, KIOS Research and Innovation Centre of Excellence, University of Cyprus, Nicosia, Cyprus"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2019.23074"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP51992.2021.00034"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00034"},{"key":"ref4","first-page":"2847","article-title":"$ICSFuzz$: Manipulating $I\/Os$ and repurposing binary code to enable instrumented fuzzing in $ICS$ control applications","volume-title":"Proc. 30th USENIX Secur. Symp. (USENIX Secur.)","author":"Tychalas"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.10804"},{"key":"ref6","first-page":"381","article-title":"\u03bcsbs: Static binary sanitization of bare-metal embedded devices for fault observability","volume-title":"Proc. 23rd Int. Symp. Res. Attacks, Intrusions Defenses (RAID)","author":"Salehi"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106245"},{"key":"ref8","first-page":"1237","article-title":"P2IM: Scalable and hardware-independent firmware testing via automatic peripheral interface modeling","volume-title":"Proc. 29th USENIX Conf. Secur. Symp.","author":"Feng"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00018"},{"key":"ref10","first-page":"1239","article-title":"FuzzWare: Using precise $MMIO$ modeling for effective firmware fuzzing","volume-title":"Proc. 31st USENIX Secur. Symp. (USENIX Secur.)","author":"Scharnowski"},{"key":"ref11","first-page":"1201","article-title":"$HALucinator$: Firmware re-hosting through abstraction layer emulation","volume-title":"Proc. 29th USENIX Secur. Symp. (USENIX Secur.)","author":"Clements"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2018.23017"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3203217.3203241"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.06.082"},{"key":"ref15","article-title":"Faster fuzzing: Reinitialization with deep neural models","author":"Nichols","year":"2017","journal-title":"arXiv:1711.02807"},{"key":"ref16","first-page":"1949","article-title":"$MOPT$: Optimized mutation scheduling for Fuzzers","volume-title":"Proc. 28th USENIX Secur. Symp. (USENIX Secur.)","author":"Lyu"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510174"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10015-020-00635-1"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-72817-9_8"},{"key":"ref20","first-page":"2007","article-title":"Automatic firmware emulation through invalidity-guided knowledge inference","volume-title":"Proc. 30th USENIX Secur. Symp. (USENIX Secur.)","author":"Zhou"},{"issue":"46","key":"ref21","first-page":"5555","article-title":"Qemu, a fast and portable dynamic translator","volume-title":"Proc. USENIX Annu. Tech. Conf., FREENIX Track","volume":"41","author":"Bellard"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2765202"},{"key":"ref23","volume-title":"American fuzzy lop","author":"Zalewski","year":"2017"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.22662\/IJEMR.2019.3.2.013"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2013.04.004"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.15"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00052"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3543516.3456276"},{"key":"ref30","article-title":"Taming the war in memory: A resilient mitigation strategy against memory safety attacks in CPS","author":"Chekole","year":"2018","journal-title":"arXiv:1809.07477"},{"key":"ref31","first-page":"10","article-title":"AFL++ combining incremental steps of fuzzing research","volume-title":"Proc. 14th USENIX Conf. Offensive Technol.","author":"Fioraldi"},{"key":"ref32","first-page":"2777","article-title":"Unifuzz: A holistic and pragmatic metrics-driven platform for evaluating fuzzers","volume-title":"Proc. USENIX Secur. Symp.","author":"Li"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00069"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/10319981\/10347559.pdf?arnumber=10347559","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T01:19:20Z","timestamp":1705022360000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10347559\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/tifs.2023.3340615","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}