{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T15:07:22Z","timestamp":1766848042669,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":63,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,27]],"date-time":"2020-10-27T00:00:00Z","timestamp":1603756800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["390621612"],"award-info":[{"award-number":["390621612"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,27]]},"DOI":"10.1145\/3419394.3423666","type":"proceedings-article","created":{"date-parts":[[2020,10,22]],"date-time":"2020-10-22T20:30:22Z","timestamp":1603398622000},"page":"101-110","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":45,"title":["Easing the Conscience with OPC UA"],"prefix":"10.1145","author":[{"given":"Markus","family":"Dahlmanns","sequence":"first","affiliation":[{"name":"Communication and Distributed Systems, RWTH Aachen University, Aachen, Germany"}]},{"given":"Johannes","family":"Lohm\u00f6ller","sequence":"additional","affiliation":[{"name":"Communication and Distributed Systems, RWTH Aachen University, Aachen, Germany"}]},{"given":"Ina Berenice","family":"Fink","sequence":"additional","affiliation":[{"name":"Communication and Distributed Systems, RWTH Aachen University, Aachen, Germany"}]},{"given":"Jan","family":"Pennekamp","sequence":"additional","affiliation":[{"name":"Communication and Distributed Systems, RWTH Aachen University, Aachen, Germany"}]},{"given":"Klaus","family":"Wehrle","sequence":"additional","affiliation":[{"name":"Communication and Distributed Systems, RWTH Aachen University, Aachen, Germany"}]},{"given":"Martin","family":"Henze","sequence":"additional","affiliation":[{"name":"Cyber Analysis &amp; Defense, Fraunhofer FKIE, Wachtberg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2020,10,27]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131401"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"crossref","unstructured":"Elaine Barker and Allen Roginsky. 2019. Recommendation for Cryptographic Key Generation. NIST SP 800-133 Rev. 1. (2019).","DOI":"10.6028\/NIST.SP.800-133r1-draft"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2014.03.001"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22038-9_5"},{"key":"e_1_3_2_2_5_1","volume-title":"Jos\u00e9 Jair Cardoso de Santanna, and Aiko Pras.","author":"Ceron Jorge Mart\u00edn","year":"2019","unstructured":"Jorge Mart\u00edn Ceron, Justyna Joanna Chromik, Jos\u00e9 Jair Cardoso de Santanna, and Aiko Pras. 2019. Online Discoverability and Vulnerabilities of ICS\/SCADA Devices in the Netherlands. Technical Report. University of Twente."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2198666"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987454"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/3794603"},{"key":"e_1_3_2_2_9_1","unstructured":"COMSYS. 2020. zgrab2 OPC UA scanner plugin. (2020). https:\/\/github.com\/COMSYS\/zgrab2"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920276"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.18154\/RWTH-2020-09197"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"crossref","unstructured":"Quynh H. Dang. 2012. Recommendation for Applications Using Approved Hash Algorithms. NIST SP 800-107 Rev. 1. (2012).","DOI":"10.6028\/NIST.SP.800-107r1"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2019.8794451"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"crossref","unstructured":"David Dittrich and Erin Kenneally. 2012. The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. Technical Report. U.S. Department of Homeland Security.","DOI":"10.2139\/ssrn.2342036"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813703"},{"volume-title":"Proceedings of the 22nd USENIX Security Symposium (SEC 14)","author":"Durumeric Zakir","key":"e_1_3_2_2_16_1","unstructured":"Zakir Durumeric, Eric Wustrow, and J. Alex Halderman. 2013. ZMap: Fast Internet-wide Scanning and Its Security Applications. In Proceedings of the 22nd USENIX Security Symposium (SEC 14). USENIX Association, 605--620."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23149"},{"key":"e_1_3_2_2_18_1","unstructured":"Federal Office for Information Secruity. 2020. Cryptographic Mechanisms. BSI TR-02102. (2020)."},{"key":"e_1_3_2_2_19_1","unstructured":"Federal Office for Information Security. 2017. OPC UA Security Analysis. Technical Report. Federal Office for Information Security (BSI)."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2016.7784407"},{"key":"e_1_3_2_2_21_1","volume-title":"FreeOpcUa Example Implementation. https:\/\/github.com\/FreeOpcUa\/python-opcua\/tree\/master\/examples. (2016 (accessed","author":"UA.","year":"2020","unstructured":"FreeOpcUA. 2016 (accessed June 2, 2020). FreeOpcUa Example Implementation. https:\/\/github.com\/FreeOpcUa\/python-opcua\/tree\/master\/examples. (2016 (accessed June 2, 2020))."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76481-8_13"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838249"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1262"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSIGSYS.2018.8372775"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.2172\/1505628"},{"volume-title":"Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices. In 21st USENIX Security Symposium (USENIX Security 12)","author":"Heninger Nadia","key":"e_1_3_2_2_27_1","unstructured":"Nadia Heninger, Zakir Durumeric, Eric Wustrow, and J. Alex Halderman. 2012. Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices. In 21st USENIX Security Symposium (USENIX Security 12). USENIX Association, Bellevue, WA, 205--220. https:\/\/www.usenix.org\/conference\/usenixsecurity12\/technical-sessions\/presentation\/heninger"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS48642.2020.9162199"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2019.8888033"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CINTI.2014.7028682"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23055"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068856"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2703172"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2013.6733571"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3230837"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12015-2"},{"key":"e_1_3_2_2_37_1","volume-title":"Proceedings of the 14th European Conference on Cyber Warfare and Security (ECCWS 15)","author":"Kiravuo Timo","year":"2015","unstructured":"Timo Kiravuo, Seppo Tiilikainen, Mikko S\u00e4rel\u00e4, and Jukka Manner. 2015. Peeking Under the Skirts of a Nation: Finding ICS Vulnerabilities in the Critical Digital Infrastructure. In Proceedings of the 14th European Conference on Cyber Warfare and Security (ECCWS 15). ACPI, 137--144."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00015"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-014-0334-4"},{"volume-title":"Quantitatively Assessing and Visualising Industrial System Attack Surfaces. Masters thesis","author":"Leverett \u00c9ireann P.","key":"e_1_3_2_2_40_1","unstructured":"\u00c9ireann P. Leverett. 2011. Quantitatively Assessing and Visualising Industrial System Attack Surfaces. Masters thesis. University of Cambridge."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68899-0"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394504"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2380790.2380805"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906943"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110256"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2910750"},{"key":"e_1_3_2_2_47_1","unstructured":"OPC Foundation. 2016. OPC UA LDS-ME! The official UA Local Discovery Server with Multicast Extensions from the OPC Foundation. https:\/\/opcfoundation.github.io\/UA-LDS\/. (2016)."},{"key":"e_1_3_2_2_48_1","unstructured":"OPC Foundation. 2017. OPC Unified Architecture --- Part 4: Services. OPC 10000-4: OPC Unified Architecture. (2017)."},{"key":"e_1_3_2_2_49_1","unstructured":"OPC Foundation. 2017. OPC Unified Architecture --- Part 7: Profiles. OPC 10000-7: OPC Unified Architecture. (2017)."},{"key":"e_1_3_2_2_50_1","unstructured":"OPC Foundation. 2018. OPC Unified Architecture --- Part 2: Security Model. OPC 10000-2: OPC Unified Architecture. (2018)."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPHYS.2019.8780276"},{"key":"e_1_3_2_2_52_1","volume-title":"Practical Security Recommendations for building OPC UA Applications. Industrial Ethernet Book 106","author":"Pohlmann Uwe","year":"2018","unstructured":"Uwe Pohlmann and Axel Sikora. 2018. Practical Security Recommendations for building OPC UA Applications. Industrial Ethernet Book 106 (2018)."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.20"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355577"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.15496\/publikation-41813"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747942"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.09.001"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700685"},{"key":"e_1_3_2_2_59_1","unstructured":"Shodan. 2013. Shodan. https:\/\/www.shodan.io. (2013)."},{"key":"e_1_3_2_2_60_1","unstructured":"Siemens AG - Division Digital Factory. 2018. SINUMERIK 840D sl\/828D \/ OPC UA - Projektierungshandbuch. Technical Report. Siemens AG."},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987480"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2855563"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"crossref","unstructured":"Keith Stouffer Victoria Pillitteri Suzanne Lightman Marshall Abrams and Adam Hahn. 2015. Guide to Industrial Control Systems (ICS) Security. NIST SP 800-82 Rev. 2. (2015).","DOI":"10.6028\/NIST.SP.800-82r2"}],"event":{"name":"IMC '20: ACM Internet Measurement Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation"],"location":"Virtual Event USA","acronym":"IMC '20"},"container-title":["Proceedings of the ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419394.3423666","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3419394.3423666","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T23:37:58Z","timestamp":1765841878000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419394.3423666"}},"subtitle":["An Internet-Wide Study on Insecure Deployments"],"short-title":[],"issued":{"date-parts":[[2020,10,27]]},"references-count":63,"alternative-id":["10.1145\/3419394.3423666","10.1145\/3419394"],"URL":"https:\/\/doi.org\/10.1145\/3419394.3423666","relation":{},"subject":[],"published":{"date-parts":[[2020,10,27]]},"assertion":[{"value":"2020-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}