{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:14:28Z","timestamp":1763507668429,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,12,9]],"date-time":"2013-12-09T00:00:00Z","timestamp":1386547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,12,9]]},"DOI":"10.1145\/2523649.2523673","type":"proceedings-article","created":{"date-parts":[[2014,1,6]],"date-time":"2014-01-06T20:44:07Z","timestamp":1389041047000},"page":"109-118","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["CPS"],"prefix":"10.1145","author":[{"given":"Stephen","family":"McLaughlin","sequence":"first","affiliation":[{"name":"Pennsylvania State University, University Park, PA"}]}],"member":"320","published-online":{"date-parts":[[2013,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Shodan. http:\/\/www.shodanhq.net.  Shodan. http:\/\/www.shodanhq.net."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2011.25"},{"volume-title":"Black Hat USA","year":"2011","author":"Beresford D.","key":"e_1_3_2_1_4_1"},{"volume-title":"Proceedings of the First Workshop on Secure Control Systems (SCS)","year":"2010","author":"Bobba R. B.","key":"e_1_3_2_1_5_1"},{"volume-title":"ISA Process Control Conference","year":"2003","author":"Byres E.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1496671.1496677"},{"key":"e_1_3_2_1_8_1","first-page":"02","volume":"11","year":"2011","journal-title":"Computer Emergency Response Team. ADVANTECH\/BROADWIN WEBACCESS RPC VULNERABILITY. ICS-CERT Advisory"},{"key":"e_1_3_2_1_9_1","first-page":"01","volume":"11","year":"2011","journal-title":"Computer Emergency Response Team. SIEMENS SIMATIC HMI AUTHENTICATION VULNERABILITIES. ICS-CERT Advisory"},{"volume-title":"University of Cambridge","year":"2011","author":"Levertt P.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","unstructured":"N. Falliere L. O. Murchu and E. Chien. W32.Stuxnet Dossier. http:\/\/www.symantec.com\/connect\/blogs\/w32stuxnet-dossier 2010.  N. Falliere L. O. Murchu and E. Chien. W32.Stuxnet Dossier. http:\/\/www.symantec.com\/connect\/blogs\/w32stuxnet-dossier 2010."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/3477.875441"},{"key":"e_1_3_2_1_13_1","unstructured":"S. Grad. Engineers who hacked into L. A. traffic signal computer jamming streets sentenced. http:\/\/latimesblogs.latimes.com.  S. Grad. Engineers who hacked into L. A. traffic signal computer jamming streets sentenced. http:\/\/latimesblogs.latimes.com."},{"key":"e_1_3_2_1_14_1","unstructured":"International Electrotechnical Commission. International Standard IEC 61131 Part 3: Programming Languages.  International Electrotechnical Commission. International Standard IEC 61131 Part 3: Programming Languages."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1813084.1813138"},{"key":"e_1_3_2_1_16_1","unstructured":"J. Leyden. Polish Teen Derails Tram after Hacking Train Network. http:\/\/www.theregister.co.uk\/2008\/01\/11\/tram_hack\/ January 2008.  J. Leyden. Polish Teen Derails Tram after Hacking Train Network. http:\/\/www.theregister.co.uk\/2008\/01\/11\/tram_hack\/ January 2008."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/832316.837586"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653666"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382244"},{"key":"e_1_3_2_1_20_1","unstructured":"J. Meserve. Sources: Staged Cyber Attack Reveals Vulnerability in Power Grid. http:\/\/articles.cnn.com\/2007-09-26\/us\/power.at.risk_1_generator-cyber-attack-electric-infrastructure?_s=PM:US September 2007.  J. Meserve. Sources: Staged Cyber Attack Reveals Vulnerability in Power Grid. http:\/\/articles.cnn.com\/2007-09-26\/us\/power.at.risk_1_generator-cyber-attack-electric-infrastructure?_s=PM:US September 2007."},{"volume-title":"Proceedings of the First Workshop on Secure Control Systems (SCS)","year":"2010","author":"Mo Y.","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"S. Mohan S. Bak E. Betti H. Yun L. Sha and M. Caccamo. S3A: Secure System Simplex Architecture for Enhanced Security of Cyber-Physical Systems. http:\/\/arxiv.org 2012.  S. Mohan S. Bak E. Betti H. Yun L. Sha and M. Caccamo. S3A: Secure System Simplex Architecture for Enhanced Security of Cyber-Physical Systems. http:\/\/arxiv.org 2012.","DOI":"10.1145\/2461446.2461456"},{"key":"e_1_3_2_1_23_1","unstructured":"National Energy Regulatory Comission. NERC CIP 002 1 - Critical Cyber Asset Identification 2006.  National Energy Regulatory Comission. NERC CIP 002 1 - Critical Cyber Asset Identification 2006."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993548"},{"key":"e_1_3_2_1_25_1","unstructured":"D. G. Peterson. Project Basecamp at S4. http:\/\/www.digitalbond.com\/2012\/01\/19\/project-basecamp-at-s4\/ January 2012.  D. G. Peterson. Project Basecamp at S4. http:\/\/www.digitalbond.com\/2012\/01\/19\/project-basecamp-at-s4\/ January 2012."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2010.2061872"},{"volume-title":"Proceedings of Black Hat USA 2010","year":"2010","author":"Pollet J.","key":"e_1_3_2_1_27_1"},{"volume-title":"Preventing Privilege Escalation. In 12th USENIX Security Symposium","year":"2003","author":"Provos N.","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"P.\n       \n      Ramadge\n     and \n      \n      \n      W.\n       \n      Wonham\n      \n  \n  . \n  Supervisory Control of a Class of Discrete Event Processes. In A. Bensoussan and J. Lions editors Analysis and Optimization of Systems volume \n  63\n   of \n  Lecture Notes in Control and Information Sciences pages \n  475\n  --\n  498\n  . \n  Springer Berlin\/Heidelberg 1984\n  . 10.1007\/BFb0006306.  P. Ramadge and W. Wonham. Supervisory Control of a Class of Discrete Event Processes. In A. Bensoussan and J. Lions editors Analysis and Optimization of Systems volume 63 of Lecture Notes in Control and Information Sciences pages 475--498. Springer Berlin\/Heidelberg 1984. 10.1007\/BFb0006306.","DOI":"10.1007\/BFb0006306"},{"volume-title":"Proceedings of the First Workshop on Secure Control Systems (SCS)","year":"2010","author":"Sandberg H.","key":"e_1_3_2_1_30_1"},{"key":"e_1_3_2_1_32_1","unstructured":"Siemens AG. Anweisungsliste (AWL) f\u00fcr S7-300\/400. http:\/\/automation.siemens.com.  Siemens AG. Anweisungsliste (AWL) f\u00fcr S7-300\/400. http:\/\/automation.siemens.com."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75462-8_6"},{"volume-title":"National Institute of Standards and Technology (NIST)","year":"2006","author":"Stouffer K.","key":"e_1_3_2_1_34_1"},{"key":"e_1_3_2_1_35_1","unstructured":"Triangle Research International. Connecting Super PLCs to the Internet. http:\/\/www.tri-plc.com\/internetconnect.htm.  Triangle Research International. Connecting Super PLCs to the Internet. http:\/\/www.tri-plc.com\/internetconnect.htm."},{"volume-title":"Control Global","year":"2009","author":"Weiss J.","key":"e_1_3_2_1_36_1"},{"key":"e_1_3_2_1_37_1","unstructured":"K. Wilhoit. Who's Really Attacking Your ICS Equipment. Trend Micro 2013.  K. Wilhoit. Who's Really Attacking Your ICS Equipment. Trend Micro 2013."},{"key":"e_1_3_2_1_38_1","unstructured":"T. Yardley. SCADA: Issues Vulnerabilities and Future Directions. ;login 34(6):14--20 December 2008.  T. Yardley. SCADA: Issues Vulnerabilities and Future Directions. ;login 34(6):14--20 December 2008."},{"volume-title":"Proceedings of the First Workshop on Secure Control Systems (SCS)","year":"2010","author":"Zhu B.","key":"e_1_3_2_1_39_1"}],"event":{"name":"ACSAC '13: Annual Computer Security Applications Conference","sponsor":["ACSA Applied Computing Security Assoc"],"location":"New Orleans Louisiana USA","acronym":"ACSAC '13"},"container-title":["Proceedings of the 29th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2523673","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2523649.2523673","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:03Z","timestamp":1750232043000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2523673"}},"subtitle":["stateful policy enforcement for control system device usage"],"short-title":[],"issued":{"date-parts":[[2013,12,9]]},"references-count":37,"alternative-id":["10.1145\/2523649.2523673","10.1145\/2523649"],"URL":"https:\/\/doi.org\/10.1145\/2523649.2523673","relation":{},"subject":[],"published":{"date-parts":[[2013,12,9]]},"assertion":[{"value":"2013-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}