{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T05:41:39Z","timestamp":1769233299290,"version":"3.49.0"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U20B2048"],"award-info":[{"award-number":["U20B2048"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U21B2019"],"award-info":[{"award-number":["U21B2019"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972255"],"award-info":[{"award-number":["61972255"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tifs.2024.3402117","type":"journal-article","created":{"date-parts":[[2024,5,16]],"date-time":"2024-05-16T17:23:00Z","timestamp":1715880180000},"page":"8685-8700","source":"Crossref","is-referenced-by-count":5,"title":["From Control Application to Control Logic: PLC Decompile Framework for Industrial Control System"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4587-9162","authenticated-orcid":false,"given":"Chao","family":"Sang","sequence":"first","affiliation":[{"name":"Shanghai Key Laboratory of Integrated Administration Technologies for Information Security, School of Electronics, Information and Electrical Engineering, and the Collaborative Innovation Center of Shanghai Industrial Internet, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2483-6980","authenticated-orcid":false,"given":"Jun","family":"Wu","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Integrated Administration Technologies for Information Security, School of Electronics, Information and Electrical Engineering, and the Collaborative Innovation Center of Shanghai Industrial Internet, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6831-3973","authenticated-orcid":false,"given":"Jianhua","family":"Li","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Integrated Administration Technologies for Information Security, School of Electronics, Information and Electrical Engineering, and the Collaborative Innovation Center of Shanghai Industrial Internet, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8972-8094","authenticated-orcid":false,"given":"Mohsen","family":"Guizani","sequence":"additional","affiliation":[{"name":"MBZUAI, Abu Dhabi, United Arab Emirates"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3078261"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3094360"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2019.119869"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.03.007"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2730581"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1087\/2\/022022"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2940890"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP51992.2021.00034"},{"key":"ref9","volume-title":"IEC 61131-3: Program. Ind. Autom. Syst.","volume":"166","author":"Tiegelkamp","year":"2010"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2604760"},{"key":"ref11","first-page":"56","article-title":"Security research: CODESYS runtime, a PLC control framework","author":"Nochvay","year":"2019"},{"key":"ref12","first-page":"2847","article-title":"ICSFuzz: Manipulating I\/Os and repurposing binary code to enable instrumented fuzzing in ICS control applications","volume-title":"Proc. 30th USENIX Secur. Symp. (USENIX Secur.)","author":"Tychalas"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1201\/9781003065708"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22312-0_3"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2019.23074"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"ref17","volume-title":"A formal specification method for PLC-based applications","author":"Darvas","year":"2015"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5724"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2016.10.603"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/b105236"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00034"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2725642"},{"key":"ref23","article-title":"ICSREF: A framework for automated reverse engineering of industrial control systems binaries","author":"Keliris","year":"2018","journal-title":"arXiv:1812.03478"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2018.05.004"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3471621.3471864"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2989063"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-50399-4_44"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2013.04.004"},{"key":"ref29","volume-title":"The IDA Pro Book","author":"Eagle","year":"2011"},{"key":"ref30","volume-title":"Radare2 book","author":"Team","year":"2017"},{"key":"ref31","volume-title":"Binseg: Leveraging semantic segmentation for code and data separation in non-standard binary formats","author":"Benkraouda","year":"2022"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2020.301013"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/IECON48115.2021.9589721"},{"key":"ref34","volume-title":"Dotnetsiemensplctoolboxlibrary","author":"K\u00fchner","year":"2014"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45848-4_57"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CSR54599.2022.9850326"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3600160.3605081"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/10319981\/10531777.pdf?arnumber=10531777","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T05:11:41Z","timestamp":1727500301000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10531777\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/tifs.2024.3402117","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}