{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:42:26Z","timestamp":1764996146202,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,5]],"date-time":"2017-12-05T00:00:00Z","timestamp":1512432000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1623657"],"award-info":[{"award-number":["1623657"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,5]]},"DOI":"10.1145\/3174776.3174777","type":"proceedings-article","created":{"date-parts":[[2018,2,23]],"date-time":"2018-02-23T16:12:59Z","timestamp":1519402379000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Securing SCADA Applications Using OpenPLC With End-To-End Encryption"],"prefix":"10.1145","author":[{"given":"Thiago","family":"Alves","sequence":"first","affiliation":[{"name":"Electrical and Computer Engineering, The University of Alabama in Huntsville, USA"}]},{"given":"Thomas","family":"Morris","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, The University of Alabama in Huntsville, USA"}]},{"given":"Seong-Moo","family":"Yoo","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, The University of Alabama in Huntsville, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"73","volume":"253","author":"Slay J.","unstructured":"Slay , J. , & Miller , M. (n.d.). Lessons Learned From the Maroochy Water Breach , 253 , 73 -- 82 . Slay, J., & Miller, M. (n.d.). Lessons Learned From the Maroochy Water Breach, 253, 73--82.","journal-title":"Lessons Learned From the Maroochy Water Breach"},{"key":"e_1_3_2_1_2_1","unstructured":"Poulsen K. Slammer Worm Crashed Ohio Nuke Plant Network. 2003 {cited 2009; Available from:http:\/\/www.securityfocus.com\/news\/6767.  Poulsen K. Slammer Worm Crashed Ohio Nuke Plant Network. 2003 {cited 2009; Available from:http:\/\/www.securityfocus.com\/news\/6767."},{"key":"e_1_3_2_1_3_1","first-page":"5","author":"Falliere","year":"2011","unstructured":"Falliere , Nicolas, Liam O. Murchu , and Eric Chien. \"W32. stuxnet dossier.\" White paper, Symantec Corp. , Security Response 5 ( 2011 ). Falliere, Nicolas, Liam O. Murchu, and Eric Chien. \"W32. stuxnet dossier.\" White paper, Symantec Corp., Security Response 5 (2011).","journal-title":"Security Response"},{"key":"e_1_3_2_1_4_1","unstructured":"ICS Focused Malware (Update A). https:\/\/ics-cert.us-cert.gov\/alerts\/ICS-ALERT-14-176-02A  ICS Focused Malware (Update A). https:\/\/ics-cert.us-cert.gov\/alerts\/ICS-ALERT-14-176-02A"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAT.2013.69"},{"key":"e_1_3_2_1_6_1","volume-title":"Technical Report TR-ISRL-04-01","author":"Graham J.","year":"2004","unstructured":"Graham , J. and Patel , S . 2004 . Security Considerations in SCADA Communication Protocols. Intelligent Systems Research Laboratory , Technical Report TR-ISRL-04-01 Graham, J. and Patel, S. 2004. Security Considerations in SCADA Communication Protocols. Intelligent Systems Research Laboratory, Technical Report TR-ISRL-04-01"},{"key":"e_1_3_2_1_7_1","volume-title":"The OpenPLC Project","author":"Alves T.","year":"2017","unstructured":"Alves , T. The OpenPLC Project : 2017 . http:\/\/openplcproject.com. Accessed : 2017-09-24. Alves, T. The OpenPLC Project: 2017. http:\/\/openplcproject.com. Accessed: 2017-09-24."},{"key":"e_1_3_2_1_8_1","volume-title":"International Electrotechnical Commission","author":"International Electrotechnical Commission","year":"1993","unstructured":"International Electrotechnical Commission . IEC 61131-3 : Programmable Controllers -- Part 3 Programming languages . International Electrotechnical Commission , Geneva, Switzerland , 1993 . International Electrotechnical Commission. IEC 61131-3: Programmable Controllers -- Part 3 Programming languages. International Electrotechnical Commission, Geneva, Switzerland, 1993."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Fovino I. Carcano A. Masera M. and Trombetta A. 2009. Design and Implementation of a Secure Modbus Protocol. IFIP Advances in Information and Communication Technology. (2009) 83--96.  Fovino I. Carcano A. Masera M. and Trombetta A. 2009. Design and Implementation of a Secure Modbus Protocol. IFIP Advances in Information and Communication Technology. (2009) 83--96.","DOI":"10.1007\/978-3-642-04798-5_6"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Majdalawieh M. Parisi-Presicce F. and Wijesekera D. DNPSec: Distributed Network Protocol Version 3 (DNP3) Security Framework. Advances in Computer Information and Systems Sciences and Engineering. 227--234.  Majdalawieh M. Parisi-Presicce F. and Wijesekera D. DNPSec: Distributed Network Protocol Version 3 (DNP3) Security Framework. Advances in Computer Information and Systems Sciences and Engineering. 227--234.","DOI":"10.1007\/1-4020-5261-8_36"},{"key":"e_1_3_2_1_11_1","volume-title":"AGA Report","author":"American Gas Association (AGA), Draft 4","year":"2004","unstructured":"American Gas Association (AGA), Draft 4 , AGA Report 12, November 2004 , Cryptographic Protection of SCADA Communications Part 1: Background, Policies and Test Plan , http:\/\/www.gtiservices.org\/security\/AGA12Draft4r1.pdf American Gas Association (AGA), Draft 4, AGA Report 12, November 2004, Cryptographic Protection of SCADA Communications Part 1: Background, Policies and Test Plan, http:\/\/www.gtiservices.org\/security\/AGA12Draft4r1.pdf"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Wright A. Kinast J. and McCarty J. 2004. Low-Latency Cryptographic Protection for SCADA Communications. Applied Cryptography and Network Security. (2004) 263--277.  Wright A. Kinast J. and McCarty J. 2004. Low-Latency Cryptographic Protection for SCADA Communications. Applied Cryptography and Network Security. (2004) 263--277.","DOI":"10.1007\/978-3-540-24852-1_19"}],"event":{"name":"ICSS 2017: 2017 Annual Industrial Control System Security Workshop","sponsor":["ACSA Applied Computing Security Assoc"],"location":"San Juan PR USA","acronym":"ICSS 2017"},"container-title":["Proceedings of the 3rd Annual Industrial Control System Security Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3174776.3174777","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3174776.3174777","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3174776.3174777","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:33Z","timestamp":1750212693000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3174776.3174777"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,5]]},"references-count":12,"alternative-id":["10.1145\/3174776.3174777","10.1145\/3174776"],"URL":"https:\/\/doi.org\/10.1145\/3174776.3174777","relation":{},"subject":[],"published":{"date-parts":[[2017,12,5]]},"assertion":[{"value":"2017-12-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}