{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:18:32Z","timestamp":1750220312096,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,9]],"date-time":"2021-08-09T00:00:00Z","timestamp":1628467200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,9]]},"DOI":"10.1145\/3474718.3474726","type":"proceedings-article","created":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T16:42:08Z","timestamp":1631032928000},"page":"27-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Getting to the HART of the Matter"],"prefix":"10.1145","author":[{"given":"Laura","family":"Tinnel","sequence":"first","affiliation":[{"name":"SRI, United States of America"}]},{"given":"Mike","family":"Cochrane","sequence":"additional","affiliation":[{"name":"TOTAL"}]}],"member":"320","published-online":{"date-parts":[[2021,9,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. MITRE Common Weakness Enumeration (CWE) Database. Online. https:\/\/cwe.mitre.org\/ Database of known cybersecurity weaknesses in software and systems designs.  [n.d.]. MITRE Common Weakness Enumeration (CWE) Database. Online. https:\/\/cwe.mitre.org\/ Database of known cybersecurity weaknesses in software and systems designs."},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. MITRE Cybersecurity Vulnerability Enumeration (CVE) Database. Online. https:\/\/cve.mitre.org\/ Database of known cybersecurity vulnerabilities in products.  [n.d.]. MITRE Cybersecurity Vulnerability Enumeration (CVE) Database. Online. https:\/\/cve.mitre.org\/ Database of known cybersecurity vulnerabilities in products."},{"key":"e_1_3_2_1_3_1","volume-title":"Retrieved","author":"Bolshev Alexander","year":"2013","unstructured":"Alexander Bolshev and Alexander Malinovsky . 2013 . HART (in)security: How one transmitter can compromise a whole plant . Retrieved Jul 16, 2021 from https:\/\/www.slideshare.net\/DefconRussia\/alexander-bolshev-alexander-malinovsky-hart-insecurity Alexander Bolshev and Alexander Malinovsky. 2013. HART (in)security: How one transmitter can compromise a whole plant. Retrieved Jul 16, 2021 from https:\/\/www.slideshare.net\/DefconRussia\/alexander-bolshev-alexander-malinovsky-hart-insecurity"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5711\/morj.10.2.19"},{"volume-title":"Highway Addressable Remote Transducer (HART) Protocol Specifications","author":"FieldComm Group 2011-2021.","key":"e_1_3_2_1_6_1","unstructured":"FieldComm Group 2011-2021. Highway Addressable Remote Transducer (HART) Protocol Specifications . FieldComm Group . https:\/\/www.fieldcommgroup.org\/hart-specifications FieldComm Group 2011-2021. Highway Addressable Remote Transducer (HART) Protocol Specifications. FieldComm Group. https:\/\/www.fieldcommgroup.org\/hart-specifications"},{"key":"e_1_3_2_1_8_1","volume-title":"Retrieved","author":"Gotei Prasad","year":"2018","unstructured":"Prasad Gotei . 2018 . Proof Testing Safety Instrumented Systems . Retrieved Jul 16, 2021 from https:\/\/engineering.purdue.edu\/P2SAC\/presentations\/documents\/Proof_Testing_Safety_Instrumented_Systems.pdf Prasad Gotei. 2018. Proof Testing Safety Instrumented Systems. Retrieved Jul 16, 2021 from https:\/\/engineering.purdue.edu\/P2SAC\/presentations\/documents\/Proof_Testing_Safety_Instrumented_Systems.pdf"},{"key":"e_1_3_2_1_9_1","volume-title":"Retrieved","author":"Johnson Blake","year":"2017","unstructured":"Blake Johnson , Dan Caban , Marina Krotofil , Dan Scali , Nathan Brubaker , and Christopher Glyer . 2017 . Attackers Deploy New ICS Attack Framework \u201cTRITON\u201d and Cause Operational Disruption to Critical Infrastructure . Retrieved Jul 16, 2021 from https:\/\/www.fireeye.com\/blog\/threat-research\/2017\/12\/attackers-deploy-new-ics-attack-framework-triton.html Threat research analysis of Triton SIS attack. Blake Johnson, Dan Caban, Marina Krotofil, Dan Scali, Nathan Brubaker, and Christopher Glyer. 2017. Attackers Deploy New ICS Attack Framework \u201cTRITON\u201d and Cause Operational Disruption to Critical Infrastructure. Retrieved Jul 16, 2021 from https:\/\/www.fireeye.com\/blog\/threat-research\/2017\/12\/attackers-deploy-new-ics-attack-framework-triton.html Threat research analysis of Triton SIS attack."},{"key":"e_1_3_2_1_10_1","volume-title":"Quantitative Risk Modeling and Analysis for Large-Scale Cyber-Physical Systems. In 2020 29th International Conference on Computer Communications and Networks (ICCCN). 1\u20136. https:\/\/doi.org\/10","author":"A.","year":"2020","unstructured":"Adeel\u00a0 A. Malik and Deepak\u00a0K. Tosh. 2020 . Quantitative Risk Modeling and Analysis for Large-Scale Cyber-Physical Systems. In 2020 29th International Conference on Computer Communications and Networks (ICCCN). 1\u20136. https:\/\/doi.org\/10 .1109\/ICCCN49398. 2020 .9209654 Adeel\u00a0A. Malik and Deepak\u00a0K. Tosh. 2020. Quantitative Risk Modeling and Analysis for Large-Scale Cyber-Physical Systems. In 2020 29th International Conference on Computer Communications and Networks (ICCCN). 1\u20136. https:\/\/doi.org\/10.1109\/ICCCN49398.2020.9209654"},{"volume-title":"Video. Retrieved","year":"2018","key":"e_1_3_2_1_12_1","unstructured":"RealPars. 2018 . What is a Safety Instrumented System . Video. Retrieved Jul 16, 2021 from https:\/\/www.youtube.com\/watch?v=W2YUNnfATBY Short tutorial on what a safety instrumented system is and why it is important. RealPars. 2018. What is a Safety Instrumented System. Video. Retrieved Jul 16, 2021 from https:\/\/www.youtube.com\/watch?v=W2YUNnfATBY Short tutorial on what a safety instrumented system is and why it is important."},{"key":"e_1_3_2_1_14_1","volume-title":"Retrieved","author":"Tinnel S","year":"2021","unstructured":"Laura\u00a0 S Tinnel and Ulf Lindqvist . 2021 . When Safety Instrument Control Goes Rogue . Retrieved Jul 16, 2021 from https:\/\/gateway.on24.com\/wcc\/eh\/3049745\/lp\/3076561\/logiic-project-12-when-safety-instrument-control-goes-rogue Laura\u00a0S Tinnel and Ulf Lindqvist. 2021. When Safety Instrument Control Goes Rogue. Retrieved Jul 16, 2021 from https:\/\/gateway.on24.com\/wcc\/eh\/3049745\/lp\/3076561\/logiic-project-12-when-safety-instrument-control-goes-rogue"}],"event":{"name":"CSET '21: Cyber Security Experimentation and Test Workshop","acronym":"CSET '21","location":"Virtual CA USA"},"container-title":["Cyber Security Experimentation and Test Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474718.3474726","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3474718.3474726","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:11:46Z","timestamp":1750191106000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474718.3474726"}},"subtitle":["An Evaluation of Real-World Safety System OT\/IT Interfaces, Attacks, and Countermeasures"],"short-title":[],"issued":{"date-parts":[[2021,8,9]]},"references-count":10,"alternative-id":["10.1145\/3474718.3474726","10.1145\/3474718"],"URL":"https:\/\/doi.org\/10.1145\/3474718.3474726","relation":{},"subject":[],"published":{"date-parts":[[2021,8,9]]},"assertion":[{"value":"2021-09-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}