{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:59:39Z","timestamp":1773511179718,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134081","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"1095-1108","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":85,"title":["Watch Me, but Don't Touch Me! Contactless Control Flow Monitoring via Electromagnetic Emanations"],"prefix":"10.1145","author":[{"given":"Yi","family":"Han","sequence":"first","affiliation":[{"name":"Rutgers University, Piscataway, NJ, USA"}]},{"given":"Sriharsha","family":"Etigowni","sequence":"additional","affiliation":[{"name":"Rutgers University, Piscataway, NJ, USA"}]},{"given":"Hua","family":"Liu","sequence":"additional","affiliation":[{"name":"Rutgers University, Piscataway, NJ, USA"}]},{"given":"Saman","family":"Zonouz","sequence":"additional","affiliation":[{"name":"Rutgers University, Piscataway, NJ, USA"}]},{"given":"Athina","family":"Petropulu","sequence":"additional","affiliation":[{"name":"Rutgers University, Piscataway, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/3--540--36400--5_4"},{"key":"e_1_3_2_2_2_1","volume-title":"Advanced PID control. ISA-The Instrumentation","author":"\u00c5str\u00f6m Karl Johan","unstructured":"Karl Johan \u00c5str\u00f6m and Tore H\u00e4gglund 2006. Advanced PID control. ISA-The Instrumentation, Systems and Automation Society."},{"key":"e_1_3_2_2_3_1","unstructured":"Dillon Beresford. 2011. Exploiting Siemens Simatic S7 PLCs. In Black Hat USA."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2014.03.001"},{"key":"e_1_3_2_2_5_1","volume-title":"CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot. Smart Grid Security","author":"Buza D\u00e1niel Istv\u00e1n","unstructured":"D\u00e1niel Istv\u00e1n Buza, Ferenc Juh\u00e1sz, Gy\u00f6rgy Miru, M\u00e1rk F\u00e9legyh\u00e1zi, and Tam\u00e1s Holczer 2014. CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot. Smart Grid Security. Springer, 181--192."},{"key":"e_1_3_2_2_6_1","first-page":"007","article-title":"Shared embedded trace macrocell. (Feb. 28 2006)","volume":"7","author":"Byrne Dayna A","year":"2006","unstructured":"Dayna A Byrne and Jeffrey J Holm 2006. Shared embedded trace macrocell. (Feb. 28 2006). US Patent 7,007,201.","journal-title":"US Patent"},{"key":"e_1_3_2_2_7_1","unstructured":"Eric Chien Liam OMurchu and Nicolas Falliere 2011. W32.Duqu - The precursor to the next Stuxnet. Technical Report. Symantic Security Response."},{"key":"e_1_3_2_2_8_1","unstructured":"Christophe Clavier. 2004. Side channel analysis for reverse engineering (SCARE)-an improved attack against a secret A3\/A8 GSM algorithm. (2004)."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17499-5_4"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","unstructured":"sriharsha Etigowni Dave Tian Grant Hernandez Kevin Butler and Saman Zonouz 2016. CPAC: Mitigating Attacks against Critical Infrastructure with Cyber-Physical Access Control. In to appear in Annual Computer Security Applications Conference (ACSAC); available at http:\/\/dx.doi.org\/10.1145\/2991079.2991126. 10.1145\/2991079.2991126","DOI":"10.1145\/2991079.2991126"},{"key":"e_1_3_2_2_11_1","unstructured":"European Network and Information Security Agency (ENISA) 2011. Protecting industrial control systems - recommendations for Europe and Member States. https:\/\/www.enisa.europa.eu\/. (2011)."},{"key":"e_1_3_2_2_12_1","unstructured":"F-Secure Labs. 2016. BLACKENERGY and QUEDAGH: The convergence of crimeware and APT attacks. (2016)."},{"key":"e_1_3_2_2_13_1","unstructured":"Nicolas Falliere Liam O. Murchu and Eric Chien. 2010. W32.Stuxnet Dossier. Technical Report. Symantic Security Response."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"crossref","unstructured":"David Formby Preethi Srinivasan Andrew Leonard Jonathan Rogers and Raheem Beyah. 2016. Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems NDSS.","DOI":"10.14722\/ndss.2016.23142"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.39"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851486"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1162\/089976600300015015"},{"key":"e_1_3_2_2_19_1","volume-title":"Power fingerprinting in SDR & CR integrity assessment MILCOM 2009--2009 IEEE Military Communications Conference","author":"Aguayo Gonzalez Carlos R","unstructured":"Carlos R Aguayo Gonzalez and Jeffrey H Reed 2009. Power fingerprinting in SDR & CR integrity assessment MILCOM 2009--2009 IEEE Military Communications Conference. IEEE, 1--7."},{"key":"e_1_3_2_2_20_1","volume-title":"Detecting unauthorized software execution in SDR using power fingerprinting Military Communications Conference","author":"Aguayo Gonzalez Carlos R","year":"2010","unstructured":"Carlos R Aguayo Gonzalez and Jeffrey H Reed 2010. Detecting unauthorized software execution in SDR using power fingerprinting Military Communications Conference, 2010-MILCOM 2010. IEEE, 2211--2216."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"crossref","unstructured":"J.F. Groote S.F.M. van Vlijmen and J.W.C. Koorn. 1995. The Safety Guaranteeing System at Station Hoorn-Kersenboogerd Tenth Annual Conference on Systems Integrity Software Safety and Process Security. 57--68.","DOI":"10.1109\/CMPASS.1995.521887"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"e_1_3_2_2_23_1","volume-title":"Document Analysis and Recognition, 1995., Proceedings of the Third International Conference on","volume":"1","author":"Ho Tin Kam","year":"1995","unstructured":"Tin Kam Ho. 1995. Random decision forests. In Document Analysis and Recognition, 1995., Proceedings of the Third International Conference on, Vol. Vol. 1. IEEE, 278--282."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2004.09.026"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.03.001"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.matcom.2015.11.005"},{"key":"e_1_3_2_2_27_1","volume-title":"On Construction and Verification of PLC-Programs. Modelirovanie i Analiz Informatsionnykh Sistem [Modeling and Analysis of Information Systems]","author":"Kuz'min Egor Vladimirovich","year":"2012","unstructured":"Egor Vladimirovich Kuz'min and Valery Anatolievich Sokolov. 2012. On Construction and Verification of PLC-Programs. Modelirovanie i Analiz Informatsionnykh Sistem [Modeling and Analysis of Information Systems], Vol. 19, 4 (2012), 25--36."},{"key":"e_1_3_2_2_28_1","volume-title":"Critical infrastructure protection in homeland security: defending a networked nation","author":"Lewis Ted G","unstructured":"Ted G Lewis. 2006. Critical infrastructure protection in homeland security: defending a networked nation. John Wiley & Sons."},{"key":"e_1_3_2_2_29_1","unstructured":"John Leyden. 2008. Polish Teen Derails Tram after Hacking Train Network. http:\/\/www.theregister.co.uk\/2008\/01\/11\/tram_hack\/. (2008)."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978299"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"crossref","unstructured":"Stephen McLaughlin and Patrick McDaniel 2012. SABOT: specification-based payload generation for programmable logic controllers Proceedings of the 2012 ACM conference on Computer and Communications Security. 439--449.","DOI":"10.1145\/2382196.2382244"},{"key":"e_1_3_2_2_33_1","volume-title":"SABOT: specification-based payload generation for programmable logic controllers Proceedings of the 2012 ACM conference on Computer and communications security","author":"McLaughlin Stephen","unstructured":"Stephen McLaughlin and Patrick McDaniel 2012. SABOT: specification-based payload generation for programmable logic controllers Proceedings of the 2012 ACM conference on Computer and communications security. New York, NY, USA, 439--449."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23043"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/79.543975"},{"key":"e_1_3_2_2_36_1","volume-title":"Engineering future cyber-physical energy systems: Challenges, research needs, and roadmap North American Power Symposium (NAPS)","author":"Morris Thomas H","year":"2009","unstructured":"Thomas H Morris, Anurag K Srivastava, Bradley Reaves, Kalyan Pavurapu, Sherif Abdelwahed, Rayford Vaughn, Wesley McGrew, and Yoginder Dandass 2009. Engineering future cyber-physical energy systems: Challenges, research needs, and roadmap North American Power Symposium (NAPS), 2009. IEEE, 1--6."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319-04283--1_18"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.2172\/1104779"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080223"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45203-4_24"},{"key":"e_1_3_2_2_41_1","volume-title":"IEEE 35th Annual Computer Software and Applications Conference (COMPSAC). IEEE, 118--127","author":"Biha Sidi Ould","year":"2011","unstructured":"Sidi Ould Biha. 2011. A Formal Semantics of PLC Programs in Coq. In IEEE 35th Annual Computer Software and Applications Conference (COMPSAC). IEEE, 118--127."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0098-1354(99)00327-0"},{"key":"e_1_3_2_2_43_1","unstructured":"Dale G. Peterson. 2012. Project Basecamp at S4. http:\/\/www.digitalbond.com\/2012\/01\/19\/project-basecamp-at-s4\/. (January 2012)."},{"key":"e_1_3_2_2_44_1","volume-title":"The Dirty Underbelly of SCADA and Smart Meters Proceedings of Black Hat USA","author":"Pollet Jonathan","year":"2010","unstructured":"Jonathan Pollet. 2010. Electricity for Free? The Dirty Underbelly of SCADA and Smart Meters Proceedings of Black Hat USA 2010."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.18626"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2016.7472844"},{"key":"e_1_3_2_2_47_1","unstructured":"Julian Rrushi Hassan Farhangi Clay Howey Kelly Carmichael and Joey Dabell [n. d.]. A Quantitative Evaluation of the Target Selection of Havex ICS Malware Plugin. ( [n. d.])."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75462-8_6"},{"key":"e_1_3_2_2_49_1","unstructured":"Armando Solar-Lezama. 2008. Program synthesis by sketching. ProQuest."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2012.05.001"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2015.02.001"},{"key":"e_1_3_2_2_53_1","unstructured":"TechNavio. 2014. Global Industrial Control Systems (ICS) Security Market 2014--2018. http:\/\/www.technavio.com\/report\/global-industrial-control-systems-ics-security-market%C2%A02014--2018. (2014)."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"crossref","DOI":"10.2172\/944885","volume-title":"Recommended pratice for patch management of control systems. DHS control system security program (CSSP) Recommended Practice","author":"Tom Steven","year":"2008","unstructured":"Steven Tom, Dale Christiansen, and Dan Berrett. 2008. Recommended pratice for patch management of control systems. DHS control system security program (CSSP) Recommended Practice (2008)."},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0095715"},{"key":"#cr-split#-e_1_3_2_2_56_1.1","unstructured":"U.S. Department of Energy Office of Electricity Delivery and Energy Reliability. 2015. North American Electric Reliability Corporation Critical Infrastructure Protection (NERC-CIP) Standards"},{"key":"#cr-split#-e_1_3_2_2_56_1.2","unstructured":"available at http:\/\/www.nerc.com\/pa\/Stand\/Pages\/CIPStandards.aspx. (2015)."},{"key":"e_1_3_2_2_58_1","volume-title":"Reverse engineering java card applets using power analysis IFIP International Workshop on Information Security Theory and Practices","author":"Vermoen Dennis","unstructured":"Dennis Vermoen, Marc Witteman, and Georgi N Gaydadjiev. 2007. Reverse engineering java card applets using power analysis IFIP International Workshop on Information Security Theory and Practices. Springer, 138--149."},{"key":"e_1_3_2_2_59_1","volume-title":"Proceedings of the 1999 IEEE Symposium on. IEEE, 133--145","author":"Warrender Christina","year":"1999","unstructured":"Christina Warrender, Stephanie Forrest, and Barak Pearlmutter 1999. Detecting intrusions using system calls: Alternative data models Security and Privacy, 1999. Proceedings of the 1999 IEEE Symposium on. IEEE, 133--145."},{"key":"e_1_3_2_2_60_1","volume-title":"Mountain View, CA","author":"Wueest Candid","year":"2014","unstructured":"Candid Wueest. 2014. Targeted attacks against the energy sector. Symantec Security Response, Mountain View, CA (2014)."},{"key":"e_1_3_2_2_61_1","volume-title":"Barbara G Ryder, and Ke Tian.","author":"Xu Kui","year":"2015","unstructured":"Kui Xu, Danfeng Daphne Yao, Barbara G Ryder, and Ke Tian. 2015. Probabilistic program modeling for high-precision anomaly classification 2015 IEEE 28th Computer Security Foundations Symposium. IEEE, 497--511."},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00026-2"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1137\/130943170"},{"key":"e_1_3_2_2_64_1","volume-title":"Beyond a Gaussian denoiser: Residual learning of deep CNN for image denoising","author":"Zhang Kai","year":"2017","unstructured":"Kai Zhang, Wangmeng Zuo, Yunjin Chen, Deyu Meng, and Lei Zhang 2017. Beyond a Gaussian denoiser: Residual learning of deep CNN for image denoising. IEEE Transactions on Image Processing (2017)."}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134081","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134081","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134081","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T19:34:08Z","timestamp":1750966448000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134081"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":62,"alternative-id":["10.1145\/3133956.3134081","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134081","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}