{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:26:18Z","timestamp":1750220778994,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Office of Naval Research","award":["N00014-15-1-2182"],"award-info":[{"award-number":["N00014-15-1-2182"]}]},{"name":"NYU Abu Dhabi Global PhD Fellowship"},{"name":"NYU Abu Dhabi Center for Cyber Security"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,5]]},"DOI":"10.1145\/3320269.3384730","type":"proceedings-article","created":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T16:33:23Z","timestamp":1601915603000},"page":"744-758","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["I came, I saw, I hacked: Automated Generation of Process-independent Attacks for Industrial Control Systems"],"prefix":"10.1145","author":[{"given":"Esha","family":"Sarkar","sequence":"first","affiliation":[{"name":"New York University, New York City, NY, USA"}]},{"given":"Hadjer","family":"Benkraouda","sequence":"additional","affiliation":[{"name":"New York University Abu Dhabi, Abu Dhabi, UAE"}]},{"given":"Michail","family":"Maniatakos","sequence":"additional","affiliation":[{"name":"New York University Abu Dhabi, Abu Dhabi, UAE"}]}],"member":"320","published-online":{"date-parts":[[2020,10,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2012.2211873"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2012.2211874"},{"volume-title":"Proceedings of the 2018 ACM CCS (CCS '18)","author":"Aoudi W.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","unstructured":"W. Ashford. 2018. Social engineering at the heart of critical infrastructure attack. https:\/\/www.computerweekly.com\/news\/252454369\/Social-engineering-at-the-heart-of-critical-infrastructure-attack. [Online].  W. Ashford. 2018. Social engineering at the heart of critical infrastructure attack. https:\/\/www.computerweekly.com\/news\/252454369\/Social-engineering-at-the-heart-of-critical-infrastructure-attack. [Online]."},{"key":"e_1_3_2_1_5_1","unstructured":"K.J. Astrom and R. M. Murray. 2008. PID Tuning Feedback Systems: An Introduction for Scientists and Engineers .Princeton University Press Princeton NJ USA.  K.J. Astrom and R. M. Murray. 2008. PID Tuning Feedback Systems: An Introduction for Scientists and Engineers .Princeton University Press Princeton NJ USA."},{"key":"e_1_3_2_1_6_1","unstructured":"J. Berr. 2017. WannaCry ransomware attack losses could reach $4 billion. https:\/\/www.cbsnews.com\/news\/wannacry-ransomware-attacks-wannacry-virus-losses\/. [Online].  J. Berr. 2017. WannaCry ransomware attack losses could reach $4 billion. https:\/\/www.cbsnews.com\/news\/wannacry-ransomware-attacks-wannacry-virus-losses\/. [Online]."},{"key":"e_1_3_2_1_7_1","unstructured":"E. Byres. 2012. #1 ICS and SCADA Security Myth: Protection by Air Gap. https:\/\/www.tofinosecurity.com\/blog\/1-ics-and-scada-security-myth-protection-air-gap.  E. Byres. 2012. #1 ICS and SCADA Security Myth: Protection by Air Gap. https:\/\/www.tofinosecurity.com\/blog\/1-ics-and-scada-security-myth-protection-air-gap."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"A. A. C\u00e1rdenas S. Amin Z. Lin Y. Huang C. Huang and S. S. Sastry. 2011. Attacks against process control systems: risk assessment detection and response. In AsiaCCS.  A. A. C\u00e1rdenas S. Amin Z. Lin Y. Huang C. Huang and S. S. Sastry. 2011. Attacks against process control systems: risk assessment detection and response. In AsiaCCS.","DOI":"10.1145\/1966913.1966959"},{"key":"e_1_3_2_1_9_1","unstructured":"Critical Infrastructure Protection Vigilence. 2011. SCADA Security Evaporates in Texas. https:\/\/ciip.wordpress.com\/tag\/scada-incidents\/. [Online].  Critical Infrastructure Protection Vigilence. 2011. SCADA Security Evaporates in Texas. https:\/\/ciip.wordpress.com\/tag\/scada-incidents\/. [Online]."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/0098-1354(93)80018-I"},{"key":"e_1_3_2_1_11_1","unstructured":"Dragos. 2017. TRISIS Malware: Analysis of Safety System Targeted Malware. https:\/\/dragos.com\/wp-content\/uploads\/TRISIS-01.pdf. [Online].  Dragos. 2017. TRISIS Malware: Analysis of Safety System Targeted Malware. https:\/\/dragos.com\/wp-content\/uploads\/TRISIS-01.pdf. [Online]."},{"key":"e_1_3_2_1_12_1","unstructured":"N. Falliere L. O. Murchu and E. Chien. 2011. W32. stuxnet dossier. White paper Symantec Corp. Security Response (Feb 2011).  N. Falliere L. O. Murchu and E. Chien. 2011. W32. stuxnet dossier. White paper Symantec Corp. Security Response (Feb 2011)."},{"key":"e_1_3_2_1_13_1","unstructured":"C. Feng T. Li Z. Zhu and D. Chana. 2017. A Deep Learning-based Framework for Conducting Stealthy Attacks in Industrial Control Systems. arxiv: cs.CR\/1709.06397  C. Feng T. Li Z. Zhu and D. Chana. 2017. A Deep Learning-based Framework for Conducting Stealthy Attacks in Industrial Control Systems. arxiv: cs.CR\/1709.06397"},{"volume-title":"Beyah","year":"2016","author":"Formby David","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"L. Garcia F. Brasser M. Hazar Cintuglu A. Sadeghi O. A. Mohammed and S. A. Zonouz. 2017. Hey My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit. In NDSS.  L. Garcia F. Brasser M. Hazar Cintuglu A. Sadeghi O. A. Mohammed and S. A. Zonouz. 2017. Hey My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit. In NDSS.","DOI":"10.14722\/ndss.2017.23313"},{"key":"e_1_3_2_1_16_1","unstructured":"F. Golnaraghi and B. C. Kuo. 2009. Automatic Control Systems 9th ed.). Wiley.  F. Golnaraghi and B. C. Kuo. 2009. Automatic Control Systems 9th ed.). Wiley."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"N. Govil A. Agrawal and N.O. Tippenhauer. 2018. On Ladder Logic Bombs in Industrial Control Systems. Springer International Publishing 110--126.  N. Govil A. Agrawal and N.O. Tippenhauer. 2018. On Ladder Logic Bombs in Industrial Control Systems. Springer International Publishing 110--126.","DOI":"10.1007\/978-3-319-72817-9_8"},{"volume-title":"Proceedings of the 30th ACSAC (ACSAC '14)","author":"Hadvziosmanovi\u0107 D.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6400435"},{"key":"e_1_3_2_1_20_1","unstructured":"Kaspersky. 2017. ICS cybersecurity: A view from the field. https:\/\/www.kaspersky.com\/blog\/ics-report-2017\/16967\/. [Online].  Kaspersky. 2017. ICS cybersecurity: A view from the field. https:\/\/www.kaspersky.com\/blog\/ics-report-2017\/16967\/. [Online]."},{"volume-title":"ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries. In NDSS.","year":"2019","author":"Keliris A.","key":"e_1_3_2_1_21_1"},{"volume-title":"2016 IEEE International Test Conference (ITC).","author":"Keliris A.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/LATW.2016.7483348"},{"key":"e_1_3_2_1_24_1","first-page":"4","article-title":"Text Classification Algorithms: A Survey","volume":"10","author":"Meimandi J.","year":"2019","journal-title":"Information"},{"key":"e_1_3_2_1_25_1","unstructured":"M. Krotofil. 2017. Evil Bubbles. https:\/\/www.blackhat.com\/us-17\/briefings\/schedule\/##evil-bubbles-or-how-to-deliver-attack-payload-via-the-physics-of-the-process-7689. [Online].  M. Krotofil. 2017. Evil Bubbles. https:\/\/www.blackhat.com\/us-17\/briefings\/schedule\/##evil-bubbles-or-how-to-deliver-attack-payload-via-the-physics-of-the-process-7689. [Online]."},{"key":"e_1_3_2_1_26_1","unstructured":"M. Krotofil and J Larsen. 2015. rocking the pocket book: Hacking chemical plants for competition and extortion cite. https:\/\/www.blackhat.com\/docs\/us-15\/materials\/us-15-Krotofil-Rocking-The-Pocket-Book-Hacking-Chemical-Plant-For-Competition-And-Extortion-wp.pdf. [Online].  M. Krotofil and J Larsen. 2015. rocking the pocket book: Hacking chemical plants for competition and extortion cite. https:\/\/www.blackhat.com\/docs\/us-15\/materials\/us-15-Krotofil-Rocking-The-Pocket-Book-Hacking-Chemical-Plant-For-Competition-And-Extortion-wp.pdf. [Online]."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714599"},{"key":"e_1_3_2_1_28_1","volume-title":"SANS Industrial Control Systems","volume":"23","author":"Lee R. M.","year":"2016"},{"volume-title":"Proceedings of the 16th ACM CCS.","author":"Liu Y.","key":"e_1_3_2_1_29_1"},{"key":"e_1_3_2_1_30_1","unstructured":"J. Matherly. 2019. SHODAN. https:\/\/www.shodan.io\/. [Online].  J. Matherly. 2019. SHODAN. https:\/\/www.shodan.io\/. [Online]."},{"volume-title":"2016 International Workshop on Cyber-physical Systems for Smart Water Networks (CySWater). 31--36","author":"Mathur A. P.","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028040.2028050"},{"volume-title":"Proceedings of the 2012 ACM CCS (CCS '12)","author":"McLaughlin S.","key":"e_1_3_2_1_33_1"},{"key":"e_1_3_2_1_34_1","unstructured":"Department of Homeland Security. [n.d.]. Critical Infrastructure Sectors. https:\/\/www.dhs.gov\/cisa\/critical-infrastructure-sectors. [Online].  Department of Homeland Security. [n.d.]. Critical Infrastructure Sectors. https:\/\/www.dhs.gov\/cisa\/critical-infrastructure-sectors. [Online]."},{"key":"e_1_3_2_1_35_1","first-page":"441","volume-title":"Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security (Asia CCS '19). Association for Computing Machinery","author":"Narayan Rajput Prashant Hari","year":"2019"},{"key":"e_1_3_2_1_36_1","unstructured":"SANS Institute. 2014. German Steel Mill Cyber Attack. https:\/\/ics.sans.org\/media\/ICS-CPPE-case-Study-2-German-Steelworks_Facility.pdf. [Online].  SANS Institute. 2014. German Steel Mill Cyber Attack. https:\/\/ics.sans.org\/media\/ICS-CPPE-case-Study-2-German-Steelworks_Facility.pdf. [Online]."},{"key":"e_1_3_2_1_37_1","unstructured":"SANS Institute. 2016. The Impact of Dragonfly Malware on Industrial Control Systems. https:\/\/www.sans.org\/reading-room\/whitepapers\/ICS\/impact-dragonfly-malware-industrial-control-systems-36672. [Online].  SANS Institute. 2016. The Impact of Dragonfly Malware on Industrial Control Systems. https:\/\/www.sans.org\/reading-room\/whitepapers\/ICS\/impact-dragonfly-malware-industrial-control-systems-36672. [Online]."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"E. Sarkar Y. Alkindi and M. Maniatakos. 2020. Backdoor Suppression in Neural Networks using Input Fuzzing and Majority Voting. IEEE Design Test (2020) 1--1. https:\/\/doi.org\/10.1109\/MDAT.2020.2968275  E. Sarkar Y. Alkindi and M. Maniatakos. 2020. Backdoor Suppression in Neural Networks using Input Fuzzing and Majority Voting. IEEE Design Test (2020) 1--1. https:\/\/doi.org\/10.1109\/MDAT.2020.2968275","DOI":"10.1109\/MDAT.2020.2968275"},{"volume-title":"Proceedings of the 2016 ACM CCS (CCS '16)","author":"Sharif M.","key":"e_1_3_2_1_39_1"},{"volume-title":"Proceedings of the 22Nd ACM CCS (CCS '15)","author":"Shoukry Y.","key":"e_1_3_2_1_40_1"},{"key":"e_1_3_2_1_41_1","unstructured":"C. Song and V.Shmatikov. 2018. Fooling OCR Systems with Adversarial Text Images. arxiv: cs.LG\/1802.05385  C. Song and V.Shmatikov. 2018. Fooling OCR Systems with Adversarial Text Images. arxiv: cs.LG\/1802.05385"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/2627435.2670313"},{"volume-title":"Scarfone","year":"2011","author":"Stouffer Keith A.","key":"e_1_3_2_1_43_1"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"D. I. Urbina J. Giraldo A. A. Cardenas J. Valente M. Faisal N. O. Tippenhauer J. Ruths R. Candell and H. Sandberg. 2016b. Survey and new directions for physics-based attack detection in control systems. US Department of Commerce NIST.  D. I. Urbina J. Giraldo A. A. Cardenas J. Valente M. Faisal N. O. Tippenhauer J. Ruths R. Candell and H. Sandberg. 2016b. Survey and new directions for physics-based attack detection in control systems. US Department of Commerce NIST.","DOI":"10.6028\/NIST.GCR.16-010"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978388"},{"volume-title":"Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security (CPSS '17)","author":"Winnicki A.R.","key":"e_1_3_2_1_46_1"},{"key":"e_1_3_2_1_47_1","unstructured":"T. Yardley. 2008. SCADA: issues vulnerabilities and future directions. https:\/\/www.usenix.org\/system\/files\/login\/articles\/258-yardley.pdf. [Online].  T. Yardley. 2008. SCADA: issues vulnerabilities and future directions. https:\/\/www.usenix.org\/system\/files\/login\/articles\/258-yardley.pdf. [Online]."},{"volume-title":"UML-based Approach for the Re-Engineering of PLC Programs. In IECON 2006 - 32nd Annual Conference on IEEE Industrial Electronics. 3691--3696","author":"Younis M. B.","key":"e_1_3_2_1_48_1"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.113"}],"event":{"name":"ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"ASIA CCS '20"},"container-title":["Proceedings of the 15th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384730","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3320269.3384730","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3320269.3384730","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:27Z","timestamp":1750200087000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384730"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,5]]},"references-count":49,"alternative-id":["10.1145\/3320269.3384730","10.1145\/3320269"],"URL":"https:\/\/doi.org\/10.1145\/3320269.3384730","relation":{},"subject":[],"published":{"date-parts":[[2020,10,5]]},"assertion":[{"value":"2020-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}