{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:52:10Z","timestamp":1763459530906,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":66,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,16]],"date-time":"2016-10-16T00:00:00Z","timestamp":1476576000000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Department of Defense","award":["FA8721-05-C-0003"],"award-info":[{"award-number":["FA8721-05-C-0003"]}]},{"name":"National Science Foundation","award":["CNS-0834701"],"award-info":[{"award-number":["CNS-0834701"]}]},{"name":"National Security Agency"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,16]]},"DOI":"10.1145\/2808705.2808714","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T11:22:12Z","timestamp":1444130532000},"page":"11-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Eliminating Inter-Domain Vulnerabilities in Cyber-Physical Systems"],"prefix":"10.1145","author":[{"given":"Ivan","family":"Ruchkin","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Ashwini","family":"Rao","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Dionisio","family":"De Niz","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Sagar","family":"Chaki","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"David","family":"Garlan","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Informatik","author":"Axer P.","year":"2012","unstructured":"P. Axer and R. Ernst. Designing an Analyzable and Resilient Embedded Operating System. In Informatik 2012, 42. Jahrestagung der Gesellschaft f\u00fcr Informatik e.V. (GI), 16.-21.09.2012, Braunschweig, 2012."},{"key":"e_1_3_2_1_2_1","volume-title":"Cyber-Physical Systems. Technical report","author":"Baheti R.","year":"2011","unstructured":"R. Baheti and H. Gill. Cyber-Physical Systems. Technical report, 2011."},{"key":"e_1_3_2_1_3_1","first-page":"2008","volume-title":"A contract-based formalism for the specification of heterogeneous systems. In 2008 Forum on Specification Verification and Design Languages","author":"Benvenuti L.","unstructured":"L. Benvenuti, A. Ferrari, L. Mangeruca, E. Mazzi, R. Passerone, and C. Sofronis. A contract-based formalism for the specification of heterogeneous systems. In 2008 Forum on Specification Verification and Design Languages. IEEE, sep 2008."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508443.2508452"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.Workshops.2008.40"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"C. S. Carlson. Effective FMEAs. John Wiley & Sons Inc. 2012.","DOI":"10.1002\/9781118312575"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028067.2028073"},{"key":"e_1_3_2_1_8_1","volume-title":"Controller Tuning and Control Loop Performance","author":"Clair D. W. S.","year":"1990","unstructured":"D. W. S. Clair. Controller Tuning and Control Loop Performance. Straight-Line Control Co., Newark, second edition edition edition, 1990."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/550565"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435227.2435245"},{"key":"e_1_3_2_1_11_1","first-page":"2007","author":"Davare A.","year":"2007","unstructured":"A. Davare, D. Densmore, T. Meyerowitz, A. Pinto, A. Sangiovanni-Vincentelli, G. Yang, H. Zeng, and Q. Zhu. A Next-Generation Design Framework for Platform-based Design. In DVCon 2007, 2007.","journal-title":"A Next-Generation Design Framework for Platform-based Design. In DVCon"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792734.1792766"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660497"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEAA.2014.20"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2002.805829"},{"key":"e_1_3_2_1_16_1","volume-title":"Collision Detection AADL","author":"McGee Ethan","year":"2013","unstructured":"Ethan McGee, Mike Kabbani, and Nicholas Guzzardo. Collision Detection AADL, 2013. https:\/\/github.com\/mikekab\/collision_detection_aadl."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-40011-7"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/678016"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1929463.1929474"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2303233"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-24590-1_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.2007.41"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.04.022"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31954-2_17"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/336431.336437"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-2789(87)90034-0"},{"key":"e_1_3_2_1_27_1","volume-title":"A logic for reasoning about time and reliability. Formal Aspects of Computing, 6(5)","author":"Hansson H.","year":"1994","unstructured":"H. Hansson and B. Jonsson. A logic for reasoning about time and reliability. Formal Aspects of Computing, 6(5), 1994."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.2011.44"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-6315-9_9"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.588521"},{"key":"e_1_3_2_1_31_1","volume-title":"The AADL Constraint Annex","author":"Hugues J.","year":"2013","unstructured":"J. Hugues and S. Gheoghe. The AADL Constraint Annex. 2013."},{"key":"e_1_3_2_1_32_1","volume-title":"lasers, and logic: Anatomy of an autonomous vehicle","author":"Iliaifar A.","year":"2013","unstructured":"A. Iliaifar. LIDAR, lasers, and logic: Anatomy of an autonomous vehicle, 2013."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/6.946636"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/QEST.2005.2"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/174003"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/1768017.1768023"},{"key":"e_1_3_2_1_38_1","volume-title":"The Past Present and Future of Cyber-Physical Systems: A Focus on Models. Sensors, 15(3)","author":"Lee E.","year":"2015","unstructured":"E. Lee. The Past Present and Future of Cyber-Physical Systems: A Focus on Models. Sensors, 15(3), 2015."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2008.25"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837274.1837462"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2010.01.003"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24769-2_18"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39701-1_14"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2013.6760152"},{"key":"e_1_3_2_1_45_1","volume-title":"Proc. IEEE, 100(1)","author":"Mo Y.","year":"2012","unstructured":"Y. Mo, T. H.-J. Kim, K. Brancik, D. Dickinson, H. Lee, A. Perrig, and B. Sinopoli. Cyber Physical Security of a Smart Grid Infrastructure. Proc. IEEE, 100(1), 2012."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2038642.2038647"},{"key":"e_1_3_2_1_47_1","volume-title":"IEEE","author":"Nitsche G.","year":"2013","unstructured":"G. Nitsche, K. Gruttner, and W. Nebel. Power contracts: A formal way towards power-closure?! In 23rd International Workshop on Power and Timing Modeling Optimization and Simulation. IEEE, 2013."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2013.2295764"},{"key":"e_1_3_2_1_49_1","volume-title":"Control, 93(1)","author":"Ogata K.","year":"1971","unstructured":"K. Ogata and J. W. Brewer. Modern Control Engineering. J. Dyn. Sys. Meas., Control, 93(1), 1971."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2014.6843720"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.5555\/1869900"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","unstructured":"Rajhans Akshay. Multi-Model Heterogeneous Verification of Cyber-Physical Systems. PhD thesis Carnegie Mellon University 2013.","DOI":"10.5555\/2539355"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837274.1837461"},{"key":"e_1_3_2_1_54_1","volume-title":"Dynamic Probabilistic Systems Volume I: Markov Models and Volume II: Semi- Markov and Decision Processes. Journal of the American Statistical Association, 67(340)","author":"Rolph J. E.","year":"1972","unstructured":"J. E. Rolph and R. A. Howard. Dynamic Probabilistic Systems Volume I: Markov Models and Volume II: Semi- Markov and Decision Processes. Journal of the American Statistical Association, 67(340), 1972."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA610323"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656045.2656052"},{"issue":"3","key":"e_1_3_2_1_57_1","volume":"18","author":"Sangiovanni-Vincentelli A.","year":"2012","unstructured":"A. Sangiovanni-Vincentelli, W. Damm, and R. Passerone. Taming Dr. Frankenstein: Contract-Based Design for Cyber-Physical Systems. European Journal of Control, 18(3), 2012.","journal-title":"Contract-Based Design for Cyber-Physical Systems. European Journal of Control"},{"key":"e_1_3_2_1_58_1","volume-title":"FMEA From Theory to Execution. Technometrics, 38(1)","author":"Schneider H.","year":"1996","unstructured":"H. Schneider. Failure Mode and Effect Analysis: FMEA From Theory to Execution. Technometrics, 38(1), 1996."},{"key":"e_1_3_2_1_59_1","volume-title":"Fault-Tolerant Architectures for Space & Avionics Applications","author":"Siewiorek D. P.","year":"2005","unstructured":"D. P. Siewiorek and P. Narasimhan. Fault-Tolerant Architectures for Space & Avionics Applications. 2005."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6654855"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54848-2_16"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2012.09.012"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997498"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWCDS.1994.289928"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/PIC.2010.5687996"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.2991\/isccca.2013.48"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Denver Colorado USA","acronym":"CCS'15"},"container-title":["Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and\/or PrivaCy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808705.2808714","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2808705.2808714","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2808705.2808714","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:47:59Z","timestamp":1763459279000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808705.2808714"}},"subtitle":["An Analysis Contracts Approach"],"short-title":[],"issued":{"date-parts":[[2015,10,16]]},"references-count":66,"alternative-id":["10.1145\/2808705.2808714","10.1145\/2808705"],"URL":"https:\/\/doi.org\/10.1145\/2808705.2808714","relation":{},"subject":[],"published":{"date-parts":[[2015,10,16]]},"assertion":[{"value":"2015-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}