{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T03:07:41Z","timestamp":1766545661725,"version":"3.37.3"},"reference-count":75,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2017,7,1]],"date-time":"2017-07-01T00:00:00Z","timestamp":1498867200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,7,1]],"date-time":"2017-07-01T00:00:00Z","timestamp":1498867200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,7,1]],"date-time":"2017-07-01T00:00:00Z","timestamp":1498867200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2017,7,1]],"date-time":"2017-07-01T00:00:00Z","timestamp":1498867200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Florida Cybersecurity Center (FC2)"},{"name":"Southeastern Center for Electrical Engineering Education","award":["SCEEE 15-001"],"award-info":[{"award-number":["SCEEE 15-001"]}]},{"DOI":"10.13039\/100000001","name":"US National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1349984"],"award-info":[{"award-number":["CCF-1349984"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Multi-Scale Comp. Syst."],"published-print":{"date-parts":[[2017,7,1]]},"DOI":"10.1109\/tmscs.2016.2569446","type":"journal-article","created":{"date-parts":[[2016,5,17]],"date-time":"2016-05-17T18:10:19Z","timestamp":1463508619000},"page":"215-227","source":"Crossref","is-referenced-by-count":86,"title":["Introduction to Cyber-Physical System Security: A Cross-Layer Perspective"],"prefix":"10.1109","volume":"3","author":[{"given":"Jacob","family":"Wurm","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8791-0597","authenticated-orcid":false,"given":"Yier","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Shiyan","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Kenneth","family":"Heffner","sequence":"additional","affiliation":[]},{"given":"Fahim","family":"Rahman","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Tehranipoor","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09699-5_29"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2014.6962099"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228486"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2014.7001348"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/CPRE.2008.4515061"},{"key":"ref39","article-title":"Fault attacks on secure chips: From glitch to flash","author":"skorobogatov","year":"0","journal-title":"Proc Design Security Cryptographic Algorithms Devices"},{"key":"ref75","first-page":"1","article-title":"Designed-in cyber security for cyber-physical systems","year":"2013","journal-title":"Proc CSRA -NIST Alliance Workshop"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.01.010"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TMSCS.2015.2498605"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2016.7428064"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2016.7562067"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2014.6742869"},{"year":"2007","key":"ref37","article-title":"Xbox 360 timing attack"},{"key":"ref36","first-page":"393","article-title":"From prey to hunter: Transforming legacy embedded devices into exploitation sensor grids","author":"cui","year":"0","journal-title":"Proc 27th Annu Comput Security Appl Conf"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.32"},{"year":"2008","key":"ref34","article-title":"Apple iphone bootloader attack"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2015.2474741"},{"key":"ref61","first-page":"9","article-title":"Physical unclonable functions for device authentication and secret key generation","author":"suh","year":"0","journal-title":"Proc 44th Annu Design Autom Conf"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2011.5982786"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1109\/TDSC.2015.2427841","article-title":"Leveraging strategic defense algorithms for smart home pricing cyberattacks","volume":"13","author":"liu","year":"0","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2015.7372563"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2554923"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2007.250627"},{"key":"ref66","first-page":"275","article-title":"True random number generators","author":"stip?evi?","year":"0","journal-title":"International Journal of Open Problems in Computer Science and Mathematics"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747930"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593236"},{"article-title":"Tamper-resistant security: Today&#x2019;s challenge","year":"0","author":"e-security","key":"ref68"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2008.18"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1837274.1837461"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"1287","DOI":"10.1109\/JPROC.2012.2189792","article-title":"Cyber-physical systems: A perspective at the centennial","volume":"100","author":"kim","year":"2012","journal-title":"Proc IEEE"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2014.7001350"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/5.192069"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2256939"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382242"},{"key":"ref23","first-page":"356","article-title":"Non-intrusive load monitoring using prior models of general appliance types","author":"parson","year":"0","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"ref26","article-title":"Extended abstract: Trustworthy SoC architecture with on-demand security policies and HW-SW cooperation","author":"jin","year":"0","journal-title":"Proc Heterogeneous Archit Workloads Workshop SoCs"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ETS.2015.7138763"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2363897"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2322503"},{"key":"ref59","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-11824-6","author":"tehranipoor","year":"2015","journal-title":"Counterfeit Integrated Circuits - Detection and Avoidance"},{"key":"ref58","article-title":"Cyber incident blamed for nuclear power plant shutdown","author":"krebs","year":"2008","journal-title":"Washington Post"},{"key":"ref57","first-page":"382","article-title":"A practical relay attack on ISO 14443 proximity cards","volume":"59","author":"hancke","year":"0"},{"article-title":"Hardware security modules","year":"2010","author":"demaertelaere","key":"ref56"},{"article-title":"Semi-invasive attacks: A new approach to hardware security analysis","year":"0","author":"skorobogatov","key":"ref55"},{"article-title":"Known attacks against smartcards","year":"0","author":"bar-el","key":"ref54"},{"key":"ref53","article-title":"Challenges for securing cyber physical systems","author":"cardenas","year":"0","journal-title":"Workshop on Future Directions in Cyber-physical Systems Security"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2011.6096958"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2418032"},{"year":"0","key":"ref11","article-title":"HomeKit"},{"journal-title":"27th Chaos Communication Congress","article-title":"Console hacking 2010: Ps3 epic fail","year":"0","key":"ref40"},{"year":"0","key":"ref12","article-title":"NEST Smart Home"},{"year":"0","key":"ref13","article-title":"Real Time Price"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2226065"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2015.2484839"},{"key":"ref16","article-title":"Smart Nest Thermostat: A smart spy in your home","author":"hernandez","year":"0","journal-title":"Black Hat USA"},{"key":"ref17","article-title":"Hack all the things: 20 devices in 45 minutes","author":"heres","year":"0","journal-title":"DefCon"},{"year":"0","key":"ref18"},{"year":"0","key":"ref19","article-title":"Smart e-meter: AMR\/AMI."},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10669-015-9540-y"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ETS.2015.7138763"},{"key":"ref6","article-title":"Target says criminals attacked with credentials stolen from vendor","author":"finkle","year":"2014","journal-title":"Reuters"},{"article-title":"Target and neiman marcus hacks: The latest","year":"2014","author":"wallace","key":"ref5"},{"key":"ref8","article-title":"World war zero: How hackers fight to steal your secrets","author":"grossman","year":"0","journal-title":"Time Mag"},{"journal-title":"Ponemon Institute Research Report","article-title":"2013 cost of data breach study: Global analysis","year":"0","key":"ref7"},{"year":"0","key":"ref49","article-title":"AM3715, AM3703 Sitara ARM Microprocessor"},{"year":"2014","key":"ref9","article-title":"Identity theft resource center breach report hits record high in 2014"},{"key":"ref46","first-page":"63","article-title":"Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks.","author":"cowan","year":"0","journal-title":"The Proceedings of the 7th USENIX Security Symposium"},{"year":"2015","key":"ref45","article-title":"Critical security flaw: Glibc stack-based buffer overflow in getaddrinfo() (cve-2015-7547)"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TMSCS.2015.2498605"},{"key":"ref47","first-page":"91","article-title":"Pointguard: protecting pointers from buffer overflow vulnerabilities","author":"cowan","year":"0","journal-title":"Proc 12th Conf Usenix Security Symp"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/2.708447"},{"key":"ref41","article-title":"Sony left passwords, code-signing keys virtually unprotected","author":"lemos","year":"2014","journal-title":"eWeek"},{"article-title":"Security holes in the 3 most popular smart home hubs and honeywell tuxedo touch","year":"0","author":"smith","key":"ref44"},{"article-title":"Some top baby monitors lack basic security features, report finds","year":"2015","author":"fowler","key":"ref43"}],"container-title":["IEEE Transactions on Multi-Scale Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielaam\/6687315\/8038902\/7470512-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6687315\/8038902\/07470512.pdf?arnumber=7470512","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,18]],"date-time":"2023-08-18T07:14:16Z","timestamp":1692342856000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7470512\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,1]]},"references-count":75,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tmscs.2016.2569446","relation":{},"ISSN":["2332-7766","2372-207X"],"issn-type":[{"type":"electronic","value":"2332-7766"},{"type":"electronic","value":"2372-207X"}],"subject":[],"published":{"date-parts":[[2017,7,1]]}}}