{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T18:35:33Z","timestamp":1766428533988,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,14]],"date-time":"2019-11-14T00:00:00Z","timestamp":1573689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,14]]},"DOI":"10.1145\/3360664.3360668","type":"proceedings-article","created":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T15:44:57Z","timestamp":1571845497000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["On the Feasibility of Secure Logging for Industrial Control Systems Using Blockchain"],"prefix":"10.1145","author":[{"given":"Stefan","family":"Schorradt","sequence":"first","affiliation":[{"name":"Ruhr-Universit\u00e4t Bochum, Bochum, Germany"}]},{"given":"Edita","family":"Bajramovic","sequence":"additional","affiliation":[{"name":"Friedrich-Alexander-Universit\u00e4t, Erlangen-N\u00fcrnberg, Erlangen, Germany"}]},{"given":"Felix","family":"Freiling","sequence":"additional","affiliation":[{"name":"Friedrich-Alexander-Universit\u00e4t, Erlangen-N\u00fcrnberg, Erlangen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2019,11,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2009.166"},{"volume-title":"Proceedings of the 7th European Conference on Public Key Infrastructures, Services and Applications (EuroPKI'10)","year":"2010","author":"Accorsi Rafael","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44598-6"},{"key":"e_1_3_2_1_4_1","unstructured":"Mihir Bellare and Bennet S. Yee. 1997. Forward Integrity For Secure Audit Logs. Available: http:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.28.7970.  Mihir Bellare and Bennet S. Yee. 1997. Forward Integrity For Secure Audit Logs. Available: http:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.28.7970."},{"volume-title":"Ethereum: A next-generation smart contract and decentralized application platform. https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper Last updated: 2018-08-22. Last accessed: 2019-01-23.","year":"2014","author":"Buterin Vitalik","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Jordi Cucurull and Jordi Puiggal\u00ed. 2016. Distributed Immutabilization of Secure Logs. In Security and Trust Management Gilles Barthe Evangelos Markatos and Pierangela Samarati (Eds.). Springer International Publishing Cham 122--137.  Jordi Cucurull and Jordi Puiggal\u00ed. 2016. Distributed Immutabilization of Secure Logs. In Security and Trust Management Gilles Barthe Evangelos Markatos and Pierangela Samarati (Eds.). Springer International Publishing Cham 122--137.","DOI":"10.1007\/978-3-319-46598-2_9"},{"key":"e_1_3_2_1_8_1","unstructured":"Didier et al. 2011. Converged Plantwide Ethernet (CPwE) Design and Implementation Guide. Cisco and Rockwell Automation.  Didier et al. 2011. Converged Plantwide Ethernet (CPwE) Design and Implementation Guide. Cisco and Rockwell Automation."},{"key":"e_1_3_2_1_9_1","unstructured":"Ali Dorri Salil S. Kanhere and Raja Jurdak. 2016. Blockchain in internet of things: Challenges and Solutions. https:\/\/arxiv.org\/pdf\/1608.05187  Ali Dorri Salil S. Kanhere and Raja Jurdak. 2016. Blockchain in internet of things: Challenges and Solutions. https:\/\/arxiv.org\/pdf\/1608.05187"},{"volume-title":"Logcrypt: Forward Security and Public Verification for Secure Audit Logs.","year":"2006","author":"Holt Jason E.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","unstructured":"Edita Bajramovic Marius Frinken Felix Freiling. 2018. Lava (Log Authentication and Verification Algorithm). (2018).  Edita Bajramovic Marius Frinken Felix Freiling. 2018. Lava (Log Authentication and Verification Algorithm). (2018)."},{"key":"e_1_3_2_1_12_1","unstructured":"Etherscan. [n.d.]. Ethereum ChainData Size Growth (FAST Sync). https:\/\/etherscan.io\/chart2\/chaindatasizefast Last accessed: 01.02.2019.  Etherscan. [n.d.]. Ethereum ChainData Size Growth (FAST Sync). https:\/\/etherscan.io\/chart2\/chaindatasizefast Last accessed: 01.02.2019."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Mislav Findrik Paul Smith Kevin Quill and Kieran McLaughlin. 2018. PLCBlock-Mon: Data Logging and Extraction on PLCs for Cyber Intrusion Detection.  Mislav Findrik Paul Smith Kevin Quill and Kieran McLaughlin. 2018. PLCBlock-Mon: Data Logging and Extraction on PLCs for Cyber Intrusion Detection.","DOI":"10.14236\/ewic\/ICS2018.12"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Felix Freiling and Edita Bajramovic. 2018. Principles of Secure Logging for Safekeeping Digital Evidence. Baier Harald; Keil Christian; Kossakowski KlausPeter; Morgenstern Holger (Ed.): Proceedings of the 11th International Conference on IT Security Incident Management & IT Forensics (2018) 65--75.  Felix Freiling and Edita Bajramovic. 2018. Principles of Secure Logging for Safekeeping Digital Evidence. Baier Harald; Keil Christian; Kossakowski KlausPeter; Morgenstern Holger (Ed.): Proceedings of the 11th International Conference on IT Security Incident Management & IT Forensics (2018) 65--75.","DOI":"10.1109\/IMF.2018.00012"},{"key":"e_1_3_2_1_15_1","unstructured":"GitHub. 2018. geth node is consistently behind the mainnet. https:\/\/github.com\/ethereum\/go-ethereum\/issues\/16218 Last accessed: 26.02.2019.  GitHub. 2018. geth node is consistently behind the mainnet. https:\/\/github.com\/ethereum\/go-ethereum\/issues\/16218 Last accessed: 26.02.2019."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Hannes Holm Martin Karresand Arne Vidstr\u00f6m and Erik Westring. 2015. A Survey of Industrial Control System Testbeds. In Secure IT Systems Sonja Buchegger and Mads Dam (Eds.). Springer International Publishing Cham 11--26.  Hannes Holm Martin Karresand Arne Vidstr\u00f6m and Erik Westring. 2015. A Survey of Industrial Control System Testbeds. In Secure IT Systems Sonja Buchegger and Mads Dam (Eds.). Springer International Publishing Cham 11--26.","DOI":"10.1007\/978-3-319-26502-5_2"},{"key":"e_1_3_2_1_18_1","unstructured":"Charlotta Johnsson. 2004. ISA 95 - how and where can it be applied? Lund Institute of Technology. Available: https:\/\/www.researchgate.net\/publication\/281063570_ISA_95_-_how_and_where_can_it_be_applied.  Charlotta Johnsson. 2004. ISA 95 - how and where can it be applied? Lund Institute of Technology. Available: https:\/\/www.researchgate.net\/publication\/281063570_ISA_95_-_how_and_where_can_it_be_applied."},{"key":"e_1_3_2_1_19_1","unstructured":"Pierre Kobes. 2016. Leitfaden Industrial Security - IEC 62443 einfach erkl\u00e4rt.  Pierre Kobes. 2016. Leitfaden Industrial Security - IEC 62443 einfach erkl\u00e4rt."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"e_1_3_2_1_21_1","volume-title":"Lecture Notes in Computer Science","volume":"5094","author":"Ma Di","year":"2008"},{"volume-title":"Bitcoin: A peer-to-peer electronic cash system,\" http:\/\/bitcoin.org\/bitcoin.pdf.","year":"2009","author":"Nakamoto Satoshi","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","unstructured":"Nate McKervey. 2018. https:\/\/www.splunk.com\/blog\/2018\/09\/24\/the-newest-data-attack.html#. https:\/\/www.splunk.com\/blog\/2018\/09\/24\/the-newest-data-attack.html# Last accessed: 03.03.2019.  Nate McKervey. 2018. https:\/\/www.splunk.com\/blog\/2018\/09\/24\/the-newest-data-attack.html#. https:\/\/www.splunk.com\/blog\/2018\/09\/24\/the-newest-data-attack.html# Last accessed: 03.03.2019."},{"key":"e_1_3_2_1_26_1","unstructured":"Luciana Obregon. 2015. Secure Architecture for Industrial Control Systems. https:\/\/www.sans.org\/reading-room\/whitepapers\/ICS\/secure-architecture-industrial-control-systems-36327 Last accessed: 01.02.2019.  Luciana Obregon. 2015. Secure Architecture for Industrial Control Systems. https:\/\/www.sans.org\/reading-room\/whitepapers\/ICS\/secure-architecture-industrial-control-systems-36327 Last accessed: 01.02.2019."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/317087.317089"},{"key":"e_1_3_2_1_28_1","unstructured":"Siemens and Tim Parmer. 2018. Advanced Controllers Enable the Smart Factory - The S7-1518 MFP a combined PLC and PC is the latest innovation in automation. Available: https:\/\/www.totallyintegratedautomation.com\/wp-content\/uploads\/2018\/04\/Siemens-Advanced-Controllers-Webinar_Apr-25-2018.pdf.  Siemens and Tim Parmer. 2018. Advanced Controllers Enable the Smart Factory - The S7-1518 MFP a combined PLC and PC is the latest innovation in automation. Available: https:\/\/www.totallyintegratedautomation.com\/wp-content\/uploads\/2018\/04\/Siemens-Advanced-Controllers-Webinar_Apr-25-2018.pdf."},{"volume-title":"Incident Analysis and Digital Forensics in SCADA and Industrial Control Systems. In 8th IET International System Safety Conference incorporating the Cyber Security Conference","year":"2013","author":"Spyridopoulos T.","key":"e_1_3_2_1_29_1"},{"key":"e_1_3_2_1_30_1","unstructured":"Trend Micro. [n.d.]. Definition - Industrial Control System. https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/industrial-control-system Last accessed: 14.01.2019.  Trend Micro. [n.d.]. Definition - Industrial Control System. https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/industrial-control-system Last accessed: 14.01.2019."},{"key":"e_1_3_2_1_31_1","unstructured":"ubirch. 2018. Blockchain for Things - Securing high-volume IoT data transmissions. https:\/\/ubirch.de\/wp-content\/uploads\/2018\/11\/ubirch-Blockchain-for-Things-v1.4-2018.pdf Last accessed: 03.03.2019.  ubirch. 2018. Blockchain for Things - Securing high-volume IoT data transmissions. https:\/\/ubirch.de\/wp-content\/uploads\/2018\/11\/ubirch-Blockchain-for-Things-v1.4-2018.pdf Last accessed: 03.03.2019."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/0166-3615(94)90017-5"},{"key":"e_1_3_2_1_33_1","unstructured":"Gavin Wood. 2018. Ethereum Yellow Paper: a formal specification of Ethereum a programmable blockchain. (2018).  Gavin Wood. 2018. Ethereum Yellow Paper: a formal specification of Ethereum a programmable blockchain. (2018)."}],"event":{"name":"CECC 2019: Central European Cybersecurity Conference","sponsor":["University of Maribor"],"location":"Munich Germany","acronym":"CECC 2019"},"container-title":["Proceedings of the Third Central European Cybersecurity Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3360664.3360668","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3360664.3360668","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:22:59Z","timestamp":1750202579000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3360664.3360668"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,14]]},"references-count":29,"alternative-id":["10.1145\/3360664.3360668","10.1145\/3360664"],"URL":"https:\/\/doi.org\/10.1145\/3360664.3360668","relation":{},"subject":[],"published":{"date-parts":[[2019,11,14]]},"assertion":[{"value":"2019-11-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}