{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T02:35:28Z","timestamp":1769913328960,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":84,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,18]],"date-time":"2020-07-18T00:00:00Z","timestamp":1595030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,18]]},"DOI":"10.1145\/3395363.3397376","type":"proceedings-article","created":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T21:44:18Z","timestamp":1594676658000},"page":"14-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Active fuzzing for testing and securing cyber-physical systems"],"prefix":"10.1145","author":[{"given":"Yuqi","family":"Chen","sequence":"first","affiliation":[{"name":"Singapore Management University, Singapore"}]},{"given":"Bohan","family":"Xuan","sequence":"additional","affiliation":[{"name":"Zhejiang University, China"}]},{"given":"Christopher M.","family":"Poskitt","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore"}]},{"given":"Jun","family":"Sun","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore"}]},{"given":"Fan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Zhejiang University, China \/ Zhejiang Lab, China \/ Alibaba-Zhejiang University Joint Institute of Frontier Technologies, China"}]}],"member":"320","published-online":{"date-parts":[[2020,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2016. CVE-2017-0144. Available from MITRE CVE-ID CVE-2017-0144.. https: \/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-0144  2016. CVE-2017-0144. Available from MITRE CVE-ID CVE-2017-0144.. https: \/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-0144"},{"key":"e_1_3_2_1_2_1","volume-title":"iTrust Labs: Datasets. https:\/\/itrust.sutd.edu.sg\/itrust-labs_datasets\/","year":"2020","unstructured":"2020. iTrust Labs: Datasets. https:\/\/itrust.sutd.edu.sg\/itrust-labs_datasets\/ . Accessed : May 2020 . 2020. iTrust Labs: Datasets. https:\/\/itrust.sutd.edu.sg\/itrust-labs_datasets\/. Accessed: May 2020."},{"key":"e_1_3_2_1_3_1","volume-title":"https:\/\/scapy.net\/","year":"2020","unstructured":"2020. Scapy. https:\/\/scapy.net\/ . Accessed : May 2020 . 2020. Scapy. https:\/\/scapy.net\/. Accessed: May 2020."},{"key":"e_1_3_2_1_4_1","volume-title":"Secure Water Treatment (SWaT ). https:\/\/itrust.sutd.edu.sg\/itrust-labshome\/itrust-labs_swat\/","year":"2020","unstructured":"2020. Secure Water Treatment (SWaT ). https:\/\/itrust.sutd.edu.sg\/itrust-labshome\/itrust-labs_swat\/ . Accessed : May 2020 . 2020. Secure Water Treatment (SWaT ). https:\/\/itrust.sutd.edu.sg\/itrust-labshome\/itrust-labs_swat\/. Accessed: May 2020."},{"key":"e_1_3_2_1_5_1","unstructured":"2020. Supplementary material. https:\/\/github.com\/yuqiChen94\/Active_fuzzer.  2020. Supplementary material. https:\/\/github.com\/yuqiChen94\/Active_fuzzer."},{"key":"e_1_3_2_1_6_1","volume-title":"https:\/\/www.wireshark.org\/","year":"2020","unstructured":"2020. Wireshark. https:\/\/www.wireshark.org\/ . Accessed : May 2020 . 2020. Wireshark. https:\/\/www.wireshark.org\/. Accessed: May 2020."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897855"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33630-5_7"},{"key":"e_1_3_2_1_9_1","volume-title":"Assessing the Efectiveness of Attack Detection at a Hackfest on Industrial Control Systems","author":"Adepu Sridhar","year":"2018","unstructured":"Sridhar Adepu and Aditya Mathur . 2018. Assessing the Efectiveness of Attack Detection at a Hackfest on Industrial Control Systems . IEEE Transactions on Sustainable Computing ( 2018 ). Sridhar Adepu and Aditya Mathur. 2018. Assessing the Efectiveness of Attack Detection at a Hackfest on Industrial Control Systems. IEEE Transactions on Sustainable Computing ( 2018 )."},{"key":"e_1_3_2_1_10_1","volume-title":"Distributed Attack Detection in a Water Treatment Plant: Method and Case Study","author":"Adepu Sridhar","year":"2018","unstructured":"Sridhar Adepu and Aditya Mathur . 2018. Distributed Attack Detection in a Water Treatment Plant: Method and Case Study . IEEE Transactions on Dependable and Secure Computing ( 2018 ). Sridhar Adepu and Aditya Mathur. 2018. Distributed Attack Detection in a Water Treatment Plant: Method and Case Study. IEEE Transactions on Dependable and Secure Computing ( 2018 )."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264893"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196532"},{"key":"e_1_3_2_1_13_1","volume-title":"Proc. Annual Computer Security Applications Conference (ACSAC 2018 ). ACM, 566-581","author":"Ahmed Chuadhry Mujeeb","unstructured":"Chuadhry Mujeeb Ahmed , Jianying Zhou , and Aditya P. Mathur . 2018. Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS . In Proc. Annual Computer Security Applications Conference (ACSAC 2018 ). ACM, 566-581 . Chuadhry Mujeeb Ahmed, Jianying Zhou, and Aditya P. Mathur. 2018. Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS. In Proc. Annual Computer Security Applications Conference (ACSAC 2018 ). ACM, 566-581."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-95582-7_27"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243781"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"John S. Atkinson John E. Mitchell Miguel Rio and George Matich. 2018. Your WiFi is leaking: What do your mobile apps gossip about you? Future Generation Comp. Syst. 80 ( 2018 ) 546-557.  John S. Atkinson John E. Mitchell Miguel Rio and George Matich. 2018. Your WiFi is leaking: What do your mobile apps gossip about you? Future Generation Comp. Syst. 80 ( 2018 ) 546-557.","DOI":"10.1016\/j.future.2016.05.030"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2013.104"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966959"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2291004"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274745"},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. Annual Conference on Neural Information Processing Systems (NIPS 2005 ). 179-186","author":"Castro Rui M.","unstructured":"Rui M. Castro , Rebecca Willett , and Robert D. Nowak . 2005. Faster Rates in Regression via Active Learning . In Proc. Annual Conference on Neural Information Processing Systems (NIPS 2005 ). 179-186 . Rui M. Castro, Rebecca Willett, and Robert D. Nowak. 2005. Faster Rates in Regression via Active Learning. In Proc. Annual Conference on Neural Information Processing Systems (NIPS 2005 ). 179-186."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.50"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2016.7798967"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48989-6_10"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00016"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00093"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134640"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243752"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-51738-4_4"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359847"},{"key":"e_1_3_2_1_31_1","volume-title":"Proc. Annual Conference on Computer Security Applications (ACSAC 2016 ). ACM, 139-152","author":"Etigowni Sriharsha","unstructured":"Sriharsha Etigowni , Dave (Jing) Tian , Grant Hernandez , Saman A. Zonouz , and Kevin R. B. Butler . 2016. CPAC: securing critical infrastructure with cyberphysical access control . In Proc. Annual Conference on Computer Security Applications (ACSAC 2016 ). ACM, 139-152 . Sriharsha Etigowni, Dave (Jing) Tian, Grant Hernandez, Saman A. Zonouz, and Kevin R. B. Butler. 2016. CPAC: securing critical infrastructure with cyberphysical access control. In Proc. Annual Conference on Computer Security Applications (ACSAC 2016 ). ACM, 139-152."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23265"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Shai Fine Ran Gilad-Bachrach and Eli Shamir. 2002. Query by committee linear separation and random walks. Theoretical Computer Science 284 1 ( 2002 ) 25-51.  Shai Fine Ran Gilad-Bachrach and Eli Shamir. 2002. Query by committee linear separation and random walks. Theoretical Computer Science 284 1 ( 2002 ) 25-51.","DOI":"10.1016\/S0304-3975(01)00079-2"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22110-1_30"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Jerome H. Friedman. 2001. Greedy Function Approximation: A Gradient Boosting Machine. Annals of Statistics 29 ( 2001 ) 1189-1232.  Jerome H. Friedman. 2001. Greedy Function Approximation: A Gradient Boosting Machine. Annals of Statistics 29 ( 2001 ) 1189-1232.","DOI":"10.1214\/aos\/1013203451"},{"key":"e_1_3_2_1_36_1","first-page":"208","volume-title":"Proc. International Conference on Automated Deduction (CADE 2013 ) (LNCS)","volume":"7898","author":"Gao Sicun","unstructured":"Sicun Gao , Soonho Kong , and Edmund M. Clarke . 2013. dReal: An SMT Solver for Nonlinear Theories over the Reals . In Proc. International Conference on Automated Deduction (CADE 2013 ) (LNCS) , Vol. 7898 . Springer , 208 - 214 . Sicun Gao, Soonho Kong, and Edmund M. Clarke. 2013. dReal: An SMT Solver for Nonlinear Theories over the Reals. In Proc. International Conference on Automated Deduction (CADE 2013 ) (LNCS), Vol. 7898. Springer, 208-214."},{"key":"e_1_3_2_1_38_1","volume-title":"Proc. Annual Conference on Neural Information Processing Systems (NIPS 2005 ). 443-450","author":"Gilad-Bachrach Ran","year":"2005","unstructured":"Ran Gilad-Bachrach , Amir Navot , and Naftali Tishby . 2005 . Query by Committee Made Real . In Proc. Annual Conference on Neural Information Processing Systems (NIPS 2005 ). 443-450 . Ran Gilad-Bachrach, Amir Navot, and Naftali Tishby. 2005. Query by Committee Made Real. In Proc. Annual Conference on Neural Information Processing Systems (NIPS 2005 ). 443-450."},{"key":"e_1_3_2_1_39_1","volume-title":"Justin Ruths, Nils Ole Tippenhauer, Henrik Sandberg, and Richard Candell.","author":"Giraldo Jairo","year":"2018","unstructured":"Jairo Giraldo , David I. Urbina , Alvaro Cardenas , Junia Valente , Mustafa Amir Faisal , Justin Ruths, Nils Ole Tippenhauer, Henrik Sandberg, and Richard Candell. 2018 . A Survey of Physics-Based Attack Detection in Cyber-Physical Systems. Comput. Surveys 51, 4 ( 2018 ), 76 : 1-76 : 36. Jairo Giraldo, David I. Urbina, Alvaro Cardenas, Junia Valente, Mustafa Amir Faisal, Justin Ruths, Nils Ole Tippenhauer, Henrik Sandberg, and Richard Candell. 2018. A Survey of Physics-Based Attack Detection in Cyber-Physical Systems. Comput. Surveys 51, 4 ( 2018 ), 76 : 1-76 : 36."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115618"},{"key":"e_1_3_2_1_41_1","volume-title":"Proc. International Conference on Critical Information Infrastructures Security (CRITIS 2016 ).","author":"Goh Jonathan","year":"2016","unstructured":"Jonathan Goh , Sridhar Adepu , Khurum Nazir Junejo , and Aditya Mathur . 2016 . A Dataset to Support Research in the Design of Secure Water Treatment Systems . In Proc. International Conference on Critical Information Infrastructures Security (CRITIS 2016 ). Jonathan Goh, Sridhar Adepu, Khurum Nazir Junejo, and Aditya Mathur. 2016. A Dataset to Support Research in the Design of Secure Water Treatment Systems. In Proc. International Conference on Critical Information Infrastructures Security (CRITIS 2016 )."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2017.36"},{"key":"e_1_3_2_1_43_1","volume-title":"Genetic Algorithms in Search, Optimization and Machine Learning","author":"Goldberg David E.","unstructured":"David E. Goldberg . 1989. Genetic Algorithms in Search, Optimization and Machine Learning . Addison-Wesley . David E. Goldberg. 1989. Genetic Algorithms in Search, Optimization and Machine Learning. Addison-Wesley."},{"key":"e_1_3_2_1_44_1","volume-title":"Beyah","author":"Gu Qinchen","year":"2018","unstructured":"Qinchen Gu , David Formby , Shouling Ji , Hasan Cam , and Raheem A . Beyah . 2018 . Fingerprinting for Cyber-Physical System Security: Device Physics Matters Too. IEEE Security & Privacy 16, 5 ( 2018 ), 49-59. Qinchen Gu, David Formby, Shouling Ji, Hasan Cam, and Raheem A. Beyah. 2018. Fingerprinting for Cyber-Physical System Security: Device Physics Matters Too. IEEE Security & Privacy 16, 5 ( 2018 ), 49-59."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWESEP.2017.12"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Amin Hassanzadeh Amin Rasekh Stefano Galelli Mohsen Aghashahi Riccardo Taormina Avi Ostfeld and M. Katherine Banks. 2019. A Review of Cybersecurity Incidents in the Water Sector. Journal of Environmental Engineering (09 2019 ).  Amin Hassanzadeh Amin Rasekh Stefano Galelli Mohsen Aghashahi Riccardo Taormina Avi Ostfeld and M. Katherine Banks. 2019. A Review of Cybersecurity Incidents in the Water Sector. Journal of Environmental Engineering (09 2019 ).","DOI":"10.1061\/(ASCE)EE.1943-7870.0001686"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31424-7_34"},{"key":"e_1_3_2_1_48_1","volume-title":"Proc. IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom 2019 ). IEEE, 160-167","author":"He Zecheng","unstructured":"Zecheng He , Aswin Raghavan , Guangyuan Hu , Sek M. Chai , and Ruby B. Lee . 2019. Power-Grid Controller Anomaly Detection with Enhanced Temporal Deep Learning . In Proc. IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom 2019 ). IEEE, 160-167 . Zecheng He, Aswin Raghavan, Guangyuan Hu, Sek M. Chai, and Ruby B. Lee. 2019. Power-Grid Controller Anomaly Detection with Enhanced Temporal Deep Learning. In Proc. IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom 2019 ). IEEE, 160-167."},{"key":"e_1_3_2_1_49_1","volume-title":"Proc. USENIX Security Symposium (USENIX 2012 ). USENIX Association, 445-458","author":"Holler Christian","year":"2012","unstructured":"Christian Holler , Kim Herzig , and Andreas Zeller . 2012 . Fuzzing with Code Fragments . In Proc. USENIX Security Symposium (USENIX 2012 ). USENIX Association, 445-458 . Christian Holler, Kim Herzig, and Andreas Zeller. 2012. Fuzzing with Code Fragments. In Proc. USENIX Security Symposium (USENIX 2012 ). USENIX Association, 445-458."},{"key":"e_1_3_2_1_50_1","volume-title":"Proc. IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2018 ). IEEE Computer Society, 151-162","author":"Huang Zhenqi","unstructured":"Zhenqi Huang , Sriharsha Etigowni , Luis Garcia , Sayan Mitra , and Saman A. Zonouz . 2018. Algorithmic Attack Synthesis Using Hybrid Dynamics of Power Grid Critical Infrastructures . In Proc. IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2018 ). IEEE Computer Society, 151-162 . Zhenqi Huang, Sriharsha Etigowni, Luis Garcia, Sayan Mitra, and Saman A. Zonouz. 2018. Algorithmic Attack Synthesis Using Hybrid Dynamics of Power Grid Critical Infrastructures. In Proc. IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2018 ). IEEE Computer Society, 151-162."},{"key":"e_1_3_2_1_51_1","unstructured":"ICS-CERT Alert. 2016. Cyber-Attack Against Ukrainian Critical Infrastructure. https:\/\/ics-cert. us-cert.gov\/alerts\/IR-ALERT-H-16-056-01. document number: IR-ALERT-H-16-056-01.  ICS-CERT Alert. 2016. Cyber-Attack Against Ukrainian Critical Infrastructure. https:\/\/ics-cert. us-cert.gov\/alerts\/IR-ALERT-H-16-056-01. document number: IR-ALERT-H-16-056-01."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.149"},{"key":"e_1_3_2_1_53_1","volume-title":"Industrial Automation and Control Systems Security. https: \/\/www.isa.org\/isa99\/","author":"ISA.","year":"2020","unstructured":"ISA. 2020. ISA99 , Industrial Automation and Control Systems Security. https: \/\/www.isa.org\/isa99\/ . Accessed : May 2020 . ISA. 2020. ISA99, Industrial Automation and Control Systems Security. https: \/\/www.isa.org\/isa99\/. Accessed: May 2020."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723871"},{"key":"e_1_3_2_1_55_1","volume-title":"Proc. International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS 2016 ). ACM, 22-28","author":"Kang Eunsuk","unstructured":"Eunsuk Kang , Sridhar Adepu , Daniel Jackson , and Aditya P. Mathur . 2016. Modelbased security analysis of a water treatment system . In Proc. International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS 2016 ). ACM, 22-28 . Eunsuk Kang, Sridhar Adepu, Daniel Jackson, and Aditya P. Mathur. 2016. Modelbased security analysis of a water treatment system. In Proc. International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS 2016 ). ACM, 22-28."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243751"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48989-6_28"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264896"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2017.12"},{"key":"e_1_3_2_1_60_1","volume-title":"Water treatment plant hacked, chemical mix changed for tap supplies. The Register ( 2016 ). https:\/\/www.theregister.co.uk\/ 2016 \/03\/24\/water_utility_hacked\/ Accessed","author":"Leyden John","year":"2020","unstructured":"John Leyden . 2016. Water treatment plant hacked, chemical mix changed for tap supplies. The Register ( 2016 ). https:\/\/www.theregister.co.uk\/ 2016 \/03\/24\/water_utility_hacked\/ Accessed : May 2020 . John Leyden. 2016. Water treatment plant hacked, chemical mix changed for tap supplies. The Register ( 2016 ). https:\/\/www.theregister.co.uk\/ 2016 \/03\/24\/water_utility_hacked\/ Accessed: May 2020."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196546"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"crossref","unstructured":"Edwin Lughofer. 2017. On-line active learning: A new paradigm to improve practical useability of data stream modeling methods. Information Sciences 415 ( 2017 ) 356-376.  Edwin Lughofer. 2017. On-line active learning: A new paradigm to improve practical useability of data stream modeling methods. Information Sciences 415 ( 2017 ) 356-376.","DOI":"10.1016\/j.ins.2017.06.038"},{"key":"e_1_3_2_1_64_1","volume-title":"Proc. Annual Network and Distributed System Security Symposium (NDSS 2014 ). The Internet Society.","author":"McLaughlin Stephen E.","unstructured":"Stephen E. McLaughlin , Saman A. Zonouz , Devin J. Pohly , and Patrick D . McDaniel. 2014. A Trusted Safety Verifier for Process Controller Code . In Proc. Annual Network and Distributed System Security Symposium (NDSS 2014 ). The Internet Society. Stephen E. McLaughlin, Saman A. Zonouz, Devin J. Pohly, and Patrick D. McDaniel. 2014. A Trusted Safety Verifier for Process Controller Code. In Proc. Annual Network and Distributed System Security Symposium (NDSS 2014 ). The Internet Society."},{"key":"e_1_3_2_1_66_1","volume-title":"Proc. Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC 2018 ). ACM, 13-23","author":"Narayanan Vedanth","unstructured":"Vedanth Narayanan and Rakesh B. Bobba . 2018. Learning Based Anomaly Detection for Industrial Arm Applications . In Proc. Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC 2018 ). ACM, 13-23 . Vedanth Narayanan and Rakesh B. Bobba. 2018. Learning Based Anomaly Detection for Industrial Arm Applications. In Proc. Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC 2018 ). ACM, 13-23."},{"key":"e_1_3_2_1_67_1","volume-title":"Proc. Annual IEEE Conference on Local Computer Networks (LCN 2006 ). IEEE Computer Society, 369-376","author":"Thuy T.","unstructured":"Thuy T. T. Nguyen and Grenville J. Armitage. 2006. Training on multiple sub-flows to optimise the use of Machine Learning classifiers in real-world IP networks . In Proc. Annual IEEE Conference on Local Computer Networks (LCN 2006 ). IEEE Computer Society, 369-376 . Thuy T. T. Nguyen and Grenville J. Armitage. 2006. Training on multiple sub-flows to optimise the use of Machine Learning classifiers in real-world IP networks. In Proc. Annual IEEE Conference on Local Computer Networks (LCN 2006 ). IEEE Computer Society, 369-376."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2011.6160641"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-015-0367-0"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264890"},{"key":"e_1_3_2_1_72_1","volume-title":"Proc. Workshop on Testing for Deep Learning and Deep Learning for Testing (DeepTest 2020 ). ACM. To appear.","author":"Shrestha Sohil Lal","year":"2020","unstructured":"Sohil Lal Shrestha , Shafiul Azam Chowdhury , and Christoph Csallner . 2020 . DeepFuzzSL: Generating models with deep learning to find bugs in the Simulink toolchain . In Proc. Workshop on Testing for Deep Learning and Deep Learning for Testing (DeepTest 2020 ). ACM. To appear. Sohil Lal Shrestha, Shafiul Azam Chowdhury, and Christoph Csallner. 2020. DeepFuzzSL: Generating models with deep learning to find bugs in the Simulink toolchain. In Proc. Workshop on Testing for Deep Learning and Deep Learning for Testing (DeepTest 2020 ). ACM. To appear."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66845-1_1"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS48642.2020.9162246"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C.2017.29"},{"key":"e_1_3_2_1_76_1","volume-title":"Proc. IEEE Conference on Communications and Network Security (CNS 2014 ). IEEE, 301-309","author":"Uluagac A. Selcuk","unstructured":"A. Selcuk Uluagac , Venkatachalam Subramanian , and Raheem A. Beyah . 2014. Sensory channel threats to Cyber Physical Systems: A wake-up call . In Proc. IEEE Conference on Communications and Network Security (CNS 2014 ). IEEE, 301-309 . A. Selcuk Uluagac, Venkatachalam Subramanian, and Raheem A. Beyah. 2014. Sensory channel threats to Cyber Physical Systems: A wake-up call. In Proc. IEEE Conference on Communications and Network Security (CNS 2014 ). IEEE, 301-309."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978388"},{"key":"e_1_3_2_1_78_1","unstructured":"US National Science Foundation. 2018. Cyber-Physical Systems (CPS). https: \/\/www.nsf.gov\/publications\/pub_summ. jsp?ods_key=nsf18538&org=NSF. document number: nsf18538.  US National Science Foundation. 2018. Cyber-Physical Systems (CPS). https: \/\/www.nsf.gov\/publications\/pub_summ. jsp?ods_key=nsf18538&org=NSF. document number: nsf18538."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030088"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-95582-7_5"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.2969178"},{"key":"e_1_3_2_1_82_1","volume-title":"Proc. ACM Cyber-Physical System Security Workshop (CPSS 2020 ). ACM. To appear.","author":"Yoong Cheah Huei","unstructured":"Cheah Huei Yoong , Venkata Reddy Palleti , Arlindo Silva , and Christopher M. Poskitt . 2020. Towards Systematically Deriving Defence Mechanisms from Functional Requirements of Cyber-Physical Systems . In Proc. ACM Cyber-Physical System Security Workshop (CPSS 2020 ). ACM. To appear. Cheah Huei Yoong, Venkata Reddy Palleti, Arlindo Silva, and Christopher M. Poskitt. 2020. Towards Systematically Deriving Defence Mechanisms from Functional Requirements of Cyber-Physical Systems. In Proc. ACM Cyber-Physical System Security Workshop (CPSS 2020 ). ACM. To appear."},{"key":"e_1_3_2_1_83_1","unstructured":"Micha\u0142 Zalewski. 2017. American fuzzy lop. http:\/\/lcamtuf.coredump.cx\/afl\/. Accessed: May 2020.  Micha\u0142 Zalewski. 2017. American fuzzy lop. http:\/\/lcamtuf.coredump.cx\/afl\/. Accessed: May 2020."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2320577"},{"key":"e_1_3_2_1_85_1","volume-title":"Proc. IEEE Symposium on Security and Privacy (S&P 2019 ). IEEE, 522-538","author":"Zhang Mu","unstructured":"Mu Zhang , Chien-Ying Chen , Bin-Chou Kao , Yassine Qamsane , Yuru Shao , Yikai Lin , Elaine Shi , Sibin Mohan , Kira Barton , James R. Moyne , and Z. Morley Mao . 2019. Towards Automated Safety Vetting of PLC Code in Real-World Plants . In Proc. IEEE Symposium on Security and Privacy (S&P 2019 ). IEEE, 522-538 . Mu Zhang, Chien-Ying Chen, Bin-Chou Kao, Yassine Qamsane, Yuru Shao, Yikai Lin, Elaine Shi, Sibin Mohan, Kira Barton, James R. Moyne, and Z. Morley Mao. 2019. Towards Automated Safety Vetting of PLC Code in Real-World Plants. In Proc. IEEE Symposium on Security and Privacy (S&P 2019 ). IEEE, 522-538."},{"key":"e_1_3_2_1_86_1","volume-title":"Proc. ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2013 ). ACM, 919-927","author":"Zhao Peilin","unstructured":"Peilin Zhao and Steven C. H. Hoi . 2013. Cost-sensitive online active learning with application to malicious URL detection . In Proc. ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2013 ). ACM, 919-927 . Peilin Zhao and Steven C. H. Hoi. 2013. Cost-sensitive online active learning with application to malicious URL detection. In Proc. ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2013 ). ACM, 919-927."}],"event":{"name":"ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Virtual Event USA","acronym":"ISSTA '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395363.3397376","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3395363.3397376","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:44Z","timestamp":1750199924000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395363.3397376"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,18]]},"references-count":84,"alternative-id":["10.1145\/3395363.3397376","10.1145\/3395363"],"URL":"https:\/\/doi.org\/10.1145\/3395363.3397376","relation":{},"subject":[],"published":{"date-parts":[[2020,7,18]]},"assertion":[{"value":"2020-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}