{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T12:23:43Z","timestamp":1763727823918,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"H2020 Marie Sk?odowska-Curie Actions","award":["690972"],"award-info":[{"award-number":["690972"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,5]]},"DOI":"10.1145\/3320269.3384735","type":"proceedings-article","created":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T16:33:23Z","timestamp":1601915603000},"page":"759-771","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Detecting Insecure Code Patterns in Industrial Robot Programs"],"prefix":"10.1145","author":[{"given":"Marcello","family":"Pogliani","sequence":"first","affiliation":[{"name":"Politecnico di Milano, Milan, Italy"}]},{"given":"Federico","family":"Maggi","sequence":"additional","affiliation":[{"name":"Trend Micro Research, Sesto San Giovanni, Italy"}]},{"given":"Marco","family":"Balduzzi","sequence":"additional","affiliation":[{"name":"Trend Micro Research, Sesto San Giovanni, Italy"}]},{"given":"Davide","family":"Quarta","sequence":"additional","affiliation":[{"name":"EURECOM, Biot, France"}]},{"given":"Stefano","family":"Zanero","sequence":"additional","affiliation":[{"name":"Politecnico di Milano, Milan, Italy"}]}],"member":"320","published-online":{"date-parts":[[2020,10,5]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"ABB. 2010. Technical reference manual. RAPID Instructions Functions and Data types.  ABB. 2010. Technical reference manual. RAPID Instructions Functions and Data types."},{"key":"e_1_3_2_2_2_1","unstructured":"ABB. 2019. RobotStudio Apps. https:\/\/robotapps.robotstudio.com  ABB. 2019. RobotStudio Apps. https:\/\/robotapps.robotstudio.com"},{"key":"e_1_3_2_2_3_1","unstructured":"Tanya M. Anandan. 2019. ROS-Industrial for Real-World Solutions. https:\/\/www.robotics.org\/content-detail.cfm\/Industrial-Robotics-Industry-Insights\/ROS-Industrial-for-Real-World-Solutions\/content_id\/7919  Tanya M. Anandan. 2019. ROS-Industrial for Real-World Solutions. https:\/\/www.robotics.org\/content-detail.cfm\/Industrial-Robotics-Industry-Insights\/ROS-Industrial-for-Real-World-Solutions\/content_id\/7919"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26362-5_18"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"volume-title":"Proc. Australasian conference on robotics and automation. 1--3.","year":"2003","author":"Biggs Geoffrey","key":"e_1_3_2_2_6_1"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISR.2013.6739742"},{"key":"e_1_3_2_2_8_1","unstructured":"Manuel Egele Christopher Kruegel Engin Kirda and Giovanni Vigna. 2011. PiOS: Detecting Privacy Leaks in iOS Applications.. In NDSS. 177--183.  Manuel Egele Christopher Kruegel Engin Kirda and Giovanni Vigna. 2011. PiOS: Detecting Privacy Leaks in iOS Applications.. In NDSS. 177--183."},{"key":"e_1_3_2_2_9_1","unstructured":"Sam Francis. 2016. Universal Robots launches app store and developer program. https:\/\/roboticsandautomationnews.com\/2016\/06\/21\/universal-robots-launches-app-store-and-developer-program\/5856\/  Sam Francis. 2016. Universal Robots launches app store and developer program. https:\/\/roboticsandautomationnews.com\/2016\/06\/21\/universal-robots-launches-app-store-and-developer-program\/5856\/"},{"volume-title":"Computer Security","author":"Govil Naman","key":"e_1_3_2_2_10_1"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.29"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/512927.512945"},{"volume-title":"Internet-facing PLCs-a new back orifice. Blackhat USA","year":"2015","author":"Klick Johannes","key":"e_1_3_2_2_13_1"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2017.13"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2018.8502576"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028040.2028050"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382244"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-019-00329-8"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.20"},{"key":"e_1_3_2_2_20_1","unstructured":"Market Research Reports. 2019. World's Top 10 Industrial Robot Manufacturers. https:\/\/www.marketresearchreports.com\/blog\/2019\/05\/08\/world%E2%80%99s-top-10-industrial-robot-manufacturers  Market Research Reports. 2019. World's Top 10 Industrial Robot Manufacturers. https:\/\/www.marketresearchreports.com\/blog\/2019\/05\/08\/world%E2%80%99s-top-10-industrial-robot-manufacturers"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/199448.199462"},{"key":"e_1_3_2_2_22_1","unstructured":"RobotShop. 2019. RobotShop App Store. https:\/\/www.robotshop.com\/en\/robot-app-store.html  RobotShop. 2019. RobotShop App Store. https:\/\/www.robotshop.com\/en\/robot-app-store.html"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17465-1_22"},{"key":"e_1_3_2_2_24_1","unstructured":"Joseph Slowik. 2019. Evolution of ICS Attacks and the Prospects for Future Disruptive Events. https:\/\/dragos.com\/wp-content\/uploads\/Evolution-of-ICS-Attacks-and-the-Prospects-for-Future-Disruptive-Events-Joseph-Slowik-1.pdf  Joseph Slowik. 2019. Evolution of ICS Attacks and the Prospects for Future Disruptive Events. https:\/\/dragos.com\/wp-content\/uploads\/Evolution-of-ICS-Attacks-and-the-Prospects-for-Future-Disruptive-Events-Joseph-Slowik-1.pdf"},{"key":"e_1_3_2_2_25_1","unstructured":"Universal Robots Support. [n.d.]. XML-RPC communication - 16326. https:\/\/www.universal-robots.com\/how-tos-and-faqs\/how-to\/ur-how-tos\/xml-rpc-communication-16326\/  Universal Robots Support. [n.d.]. XML-RPC communication - 16326. https:\/\/www.universal-robots.com\/how-tos-and-faqs\/how-to\/ur-how-tos\/xml-rpc-communication-16326\/"},{"volume-title":"Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery. In 11th USENIX Workshop on Offensive Technologies (WOOT 17)","year":"2017","author":"Unruh Tommi","key":"e_1_3_2_2_26_1"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.44"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"crossref","unstructured":"Mu Zhang James Moyne Z Morley Mao Chien-Ying Chen Bin-Chou Kao Yassine Qamsane Yuru Shao Yikai Lin Elaine Shi Sibin Mohan etal 2019. Towards Automated Safety Vetting of PLC Code in Real-World Plants. In Towards Automated Safety Vetting of PLC Code in Real-World Plants. IEEE IEEE 0.  Mu Zhang James Moyne Z Morley Mao Chien-Ying Chen Bin-Chou Kao Yassine Qamsane Yuru Shao Yikai Lin Elaine Shi Sibin Mohan et al. 2019. Towards Automated Safety Vetting of PLC Code in Real-World Plants. In Towards Automated Safety Vetting of PLC Code in Real-World Plants. IEEE IEEE 0.","DOI":"10.1109\/SP.2019.00034"}],"event":{"name":"ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"ASIA CCS '20"},"container-title":["Proceedings of the 15th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384735","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3320269.3384735","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:27Z","timestamp":1750200087000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384735"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,5]]},"references-count":28,"alternative-id":["10.1145\/3320269.3384735","10.1145\/3320269"],"URL":"https:\/\/doi.org\/10.1145\/3320269.3384735","relation":{},"subject":[],"published":{"date-parts":[[2020,10,5]]},"assertion":[{"value":"2020-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}