{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:55:33Z","timestamp":1774022133861,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":82,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,18]],"date-time":"2021-08-18T00:00:00Z","timestamp":1629244800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Research Foundation, Singapore","award":["NSoE_DeST-SCI2019-0008"],"award-info":[{"award-number":["NSoE_DeST-SCI2019-0008"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,20]]},"DOI":"10.1145\/3468264.3468617","type":"proceedings-article","created":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T01:40:37Z","timestamp":1629337237000},"page":"32-44","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Code integrity attestation for PLCs using black box neural network predictions"],"prefix":"10.1145","author":[{"given":"Yuqi","family":"Chen","sequence":"first","affiliation":[{"name":"Singapore Management University, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9376-2471","authenticated-orcid":false,"given":"Christopher M.","family":"Poskitt","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3545-1392","authenticated-orcid":false,"given":"Jun","family":"Sun","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2021,8,18]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"iTrust Labs: Datasets. https:\/\/itrust.sutd.edu.sg\/itrust-labs_datasets\/ Accessed","year":"2021","unstructured":"2021. iTrust Labs: Datasets. https:\/\/itrust.sutd.edu.sg\/itrust-labs_datasets\/ Accessed : June 2021 . 2021. iTrust Labs: Datasets. https:\/\/itrust.sutd.edu.sg\/itrust-labs_datasets\/ Accessed: June 2021."},{"key":"e_1_3_2_1_2_1","unstructured":"2021. Secure Water Treatment (SWaT). http:\/\/itrust.sutd.edu.sg\/research\/testbeds\/secure-water-treatment-swat\/ Accessed: June 2021.  2021. Secure Water Treatment (SWaT). http:\/\/itrust.sutd.edu.sg\/research\/testbeds\/secure-water-treatment-swat\/ Accessed: June 2021."},{"key":"e_1_3_2_1_3_1","unstructured":"2021. Supplementary material. https:\/\/github.com\/sav-smu\/plc-code-integrity  2021. Supplementary material. https:\/\/github.com\/sav-smu\/plc-code-integrity"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134618"},{"key":"e_1_3_2_1_5_1","volume-title":"Proc. International Conference on Learning Representations (ICLR","author":"Abbasi Mahdieh","year":"2017","unstructured":"Mahdieh Abbasi and Christian Gagn\u00e9 . 2017 . Robustness to Adversarial Examples through an Ensemble of Specialists . In Proc. International Conference on Learning Representations (ICLR 2017). OpenReview.net. Mahdieh Abbasi and Christian Gagn\u00e9. 2017. Robustness to Adversarial Examples through an Ensemble of Specialists. In Proc. International Conference on Learning Representations (ICLR 2017). OpenReview.net."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978358"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS48487.2020.00011"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897855"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33630-5_7"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2018.2878597"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2875008"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264893"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3410447"},{"key":"e_1_3_2_1_14_1","volume-title":"Scanning the Cycle: Timing-based Authentication on PLCs. CoRR, abs\/2102.08985","author":"Ahmed Chuadhry Mujeeb","year":"2021","unstructured":"Chuadhry Mujeeb Ahmed , Mart\u00edn Ochoa , Jianying Zhou , and Aditya Mathur . 2021. Scanning the Cycle: Timing-based Authentication on PLCs. CoRR, abs\/2102.08985 ( 2021 ). Chuadhry Mujeeb Ahmed, Mart\u00edn Ochoa, Jianying Zhou, and Aditya Mathur. 2021. Scanning the Cycle: Timing-based Authentication on PLCs. CoRR, abs\/2102.08985 (2021)."},{"key":"e_1_3_2_1_15_1","unstructured":"Tiago Alves and Don Felton. 2004. TrustZone: Integrated Hardware and Software Security.  Tiago Alves and Don Felton. 2004. TrustZone: Integrated Hardware and Software Security."},{"key":"e_1_3_2_1_16_1","unstructured":"Ittai Anati Shay Gueron Simon P Johnson and Vincent R Scarlata. 2013. Innovative Technology for CPU Based Attestation and Sealing.  Ittai Anati Shay Gueron Simon P Johnson and Vincent R Scarlata. 2013. Innovative Technology for CPU Based Attestation and Sealing."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243781"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2013.04.004"},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. International Conference on Quality Software (QSIC","author":"Brandl Harald","year":"2010","unstructured":"Harald Brandl , Martin Weiglhofer , and Bernhard K. Aichernig . 2010. Automated Conformance Verification of Hybrid Systems . In Proc. International Conference on Quality Software (QSIC 2010 ). IEEE Computer Society, 3\u201312. Harald Brandl, Martin Weiglhofer, and Bernhard K. Aichernig. 2010. Automated Conformance Verification of Hybrid Systems. In Proc. International Conference on Quality Software (QSIC 2010). IEEE Computer Society, 3\u201312."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966959"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2291004"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2019.00212"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653711"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48989-6_10"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00016"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00093"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397376"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134640"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243752"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380381"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-011-0124-7"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101935"},{"key":"e_1_3_2_1_33_1","volume-title":"No Need to Know Physics: Resilience of Process-based Model-free Anomaly Detection for Industrial Control Systems. CoRR, abs\/2012.03586","author":"Erba Alessandro","year":"2020","unstructured":"Alessandro Erba and Nils Ole Tippenhauer . 2020. No Need to Know Physics: Resilience of Process-based Model-free Anomaly Detection for Industrial Control Systems. CoRR, abs\/2012.03586 ( 2020 ). Alessandro Erba and Nils Ole Tippenhauer. 2020. No Need to Know Physics: Resilience of Process-based Model-free Anomaly Detection for Industrial Control Systems. CoRR, abs\/2012.03586 (2020)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23265"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23142"},{"key":"e_1_3_2_1_36_1","volume-title":"Proc. Annual Network and Distributed System Security Symposium (NDSS","author":"Garcia Luis","year":"2017","unstructured":"Luis Garcia , Ferdinand Brasser , Mehmet Hazar Cintuglu , Ahmad-Reza Sadeghi , Osama A. Mohammed , and Saman A. Zonouz . 2017. Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit . In Proc. Annual Network and Distributed System Security Symposium (NDSS 2017 ). The Internet Society. Luis Garcia, Ferdinand Brasser, Mehmet Hazar Cintuglu, Ahmad-Reza Sadeghi, Osama A. Mohammed, and Saman A. Zonouz. 2017. Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit. In Proc. Annual Network and Distributed System Security Symposium (NDSS 2017). The Internet Society."},{"key":"e_1_3_2_1_37_1","volume-title":"Proc. International Symposium on Research in Attacks, Intrusions and Defenses (RAID","author":"Ghaeini Hamid Reza","year":"2019","unstructured":"Hamid Reza Ghaeini , Matthew Chan , Raad Bahmani , Ferdinand Brasser , Luis Garcia , Jianying Zhou , Ahmad-Reza Sadeghi , Nils Ole Tippenhauer , and Saman A. Zonouz . 2019. PAtt: Physics-based Attestation of Control Systems . In Proc. International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019 ). USENIX Association, 165\u2013180. Hamid Reza Ghaeini, Matthew Chan, Raad Bahmani, Ferdinand Brasser, Luis Garcia, Jianying Zhou, Ahmad-Reza Sadeghi, Nils Ole Tippenhauer, and Saman A. Zonouz. 2019. PAtt: Physics-based Attestation of Control Systems. In Proc. International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). USENIX Association, 165\u2013180."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409739"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3203245"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3384217.3385624"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71368-7_8"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2017.36"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.3761722"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWESEP.2017.12"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00030"},{"key":"e_1_3_2_1_46_1","unstructured":"2013. Programmable controllers - Part 3: Programming languages. International Electrotechnical Commission.  2013. Programmable controllers - Part 3: Programming languages. International Electrotechnical Commission."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.149"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2021.100452"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-42048-2_1"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243751"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264896"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046711"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196546"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115639"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/CySWater.2016.7469060"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264894"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795300"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2011.6160641"},{"key":"e_1_3_2_1_61_1","unstructured":"Nieke Roos. [n.d.]. Programming PLCs using Structured Text.  Nieke Roos. [n.d.]. Programming PLCs using Structured Text."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03964-0_9"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2017.188"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3040237"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-54549-9_12"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264890"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095812"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"e_1_3_2_1_69_1","volume-title":"Black Hat Asia","author":"Spenneberg Ralf","year":"2016","unstructured":"Ralf Spenneberg , Maik Br\u00fcggemann , and Hendrik Schwartke . 2016. PLC-Blaster: A Worm Living Solely in the PLC . In Black Hat Asia 2016 . Black Hat . Ralf Spenneberg, Maik Br\u00fcggemann, and Hendrik Schwartke. 2016. PLC-Blaster: A Worm Living Solely in the PLC. In Black Hat Asia 2016. Black Hat."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS48642.2020.9162246"},{"key":"e_1_3_2_1_71_1","volume-title":"SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses. CoRR, abs\/2006.04806","author":"Sun Ruimin","year":"2020","unstructured":"Ruimin Sun , Alejandro Mera , Long Lu , and David Choffnes . 2020. SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses. CoRR, abs\/2006.04806 ( 2020 ). Ruimin Sun, Alejandro Mera, Long Lu, and David Choffnes. 2020. SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses. CoRR, abs\/2006.04806 (2020)."},{"key":"e_1_3_2_1_72_1","volume-title":"Proc. International Conference on Learning Representations (ICLR","author":"Tram\u00e8r Florian","year":"2018","unstructured":"Florian Tram\u00e8r , Alexey Kurakin , Nicolas Papernot , Ian J. Goodfellow , Dan Boneh , and Patrick D . McDaniel. 2018. Ensemble Adversarial Training: Attacks and Defenses . In Proc. International Conference on Learning Representations (ICLR 2018 ). OpenReview.net. Florian Tram\u00e8r, Alexey Kurakin, Nicolas Papernot, Ian J. Goodfellow, Dan Boneh, and Patrick D. McDaniel. 2018. Ensemble Adversarial Training: Attacks and Defenses. In Proc. International Conference on Learning Representations (ICLR 2018). OpenReview.net."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2020.100341"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978388"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2014.61"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00126"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2886898"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387940.3391486"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2980921"},{"key":"e_1_3_2_1_80_1","volume-title":"Proc. International Symposium on Research in Attacks, Intrusions and Defenses (RAID","author":"Yang Zeyu","year":"2020","unstructured":"Zeyu Yang , Liang He , Peng Cheng , Jiming Chen , David K.Y. Yau , and Linkang Du . 2020 . PLC-Sleuth: Detecting and Localizing PLC Intrusions Using Control Invariants . In Proc. International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). USENIX Association, 333\u2013348. Zeyu Yang, Liang He, Peng Cheng, Jiming Chen, David K.Y. Yau, and Linkang Du. 2020. PLC-Sleuth: Detecting and Localizing PLC Intrusions Using Control Invariants. In Proc. International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). USENIX Association, 333\u2013348."},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-021-00069-7"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00034"}],"event":{"name":"ESEC\/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Athens Greece","acronym":"ESEC\/FSE '21","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468264.3468617","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3468264.3468617","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:22Z","timestamp":1750191442000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468264.3468617"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,18]]},"references-count":82,"alternative-id":["10.1145\/3468264.3468617","10.1145\/3468264"],"URL":"https:\/\/doi.org\/10.1145\/3468264.3468617","relation":{},"subject":[],"published":{"date-parts":[[2021,8,18]]},"assertion":[{"value":"2021-08-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}