{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:21Z","timestamp":1750220241530,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T00:00:00Z","timestamp":1666742400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["#2112562,CMMI-2038215,CNS-1930041,CNS-1544678,OAC-211516,DGE-2041960"],"award-info":[{"award-number":["#2112562,CMMI-2038215,CNS-1930041,CNS-1544678,OAC-211516,DGE-2041960"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["HR00112120009"],"award-info":[{"award-number":["HR00112120009"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,26]]},"DOI":"10.1145\/3545948.3545954","type":"proceedings-article","created":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T11:21:49Z","timestamp":1666005709000},"page":"333-349","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Automated Runtime Mitigation for Misconfiguration Vulnerabilities in Industrial Control Systems"],"prefix":"10.1145","author":[{"given":"Qingzhao","family":"Zhang","sequence":"first","affiliation":[{"name":"University of Michigan, United States of America"}]},{"given":"Xiao","family":"Zhu","sequence":"additional","affiliation":[{"name":"University of Michigan, United States of America"}]},{"given":"Mu","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Utah, United States of America"}]},{"given":"Z. Morley","family":"Mao","sequence":"additional","affiliation":[{"name":"University of Michigan, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2022,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2019. Cyberattack Hits Indian Nuclear Plant.https:\/\/www.armscontrol.org\/act\/2019-12\/news\/cyberattack-hits-indian-nuclear-plant  2019. Cyberattack Hits Indian Nuclear Plant.https:\/\/www.armscontrol.org\/act\/2019-12\/news\/cyberattack-hits-indian-nuclear-plant"},{"key":"e_1_3_2_1_2_1","unstructured":"2019. Toyota to Close Japan Plants After Suspected Cyberattack.https:\/\/threatpost.com\/toyota-to-close-japan-plants-after-suspected-cyberattack\/178686\/  2019. Toyota to Close Japan Plants After Suspected Cyberattack.https:\/\/threatpost.com\/toyota-to-close-japan-plants-after-suspected-cyberattack\/178686\/"},{"key":"e_1_3_2_1_3_1","unstructured":"2021. Ransomware Disrupts Meat Plants in Latest Attack on Critical U.S. Business.https:\/\/www.nytimes.com\/2021\/06\/01\/business\/meat-plant-cyberattack-jbs.html?smid=url-share  2021. Ransomware Disrupts Meat Plants in Latest Attack on Critical U.S. Business.https:\/\/www.nytimes.com\/2021\/06\/01\/business\/meat-plant-cyberattack-jbs.html?smid=url-share"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS48487.2020.00011"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/174644.174651"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243781"},{"volume-title":"Handbook of Model Checking","author":"Barrett Clark","key":"e_1_3_2_1_8_1","unstructured":"Clark Barrett and Cesare Tinelli . 2018. Satisfiability modulo theories . In Handbook of Model Checking . Springer , 305\u2013343. Clark Barrett and Cesare Tinelli. 2018. Satisfiability modulo theories. In Handbook of Model Checking. Springer, 305\u2013343."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2016.2601418"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2017.08.2395"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Bernhard Beckert Mattias Ulbrich Birgit Vogel-Heuser and Alexander Weigl. 2015. Regression Verification for Programmable Logic Controller Software. In Formal Methods and Software Engineering.  Bernhard Beckert Mattias Ulbrich Birgit Vogel-Heuser and Alexander Weigl. 2015. Regression Verification for Programmable Logic Controller Software. In Formal Methods and Software Engineering.","DOI":"10.1007\/978-3-319-25423-4_15"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10817-017-9432-6"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351741"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2011.2182653"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3471621.3471864"},{"volume-title":"2018 IEEE Symposium on Security and Privacy (Oakland\u201918)","author":"Chen Y.","key":"e_1_3_2_1_16_1","unstructured":"Y. Chen , C.\u00a0 M. Poskitt , and J. Sun . 2018. Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System . In 2018 IEEE Symposium on Security and Privacy (Oakland\u201918) . Y. Chen, C.\u00a0M. Poskitt, and J. Sun. 2018. Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System. In 2018 IEEE Symposium on Security and Privacy (Oakland\u201918)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"e_1_3_2_1_19_1","unstructured":"Nicolas Falliere Liam\u00a0O Murchu and Eric Chien. 2021. W32.Stuxnet Dossier. https:\/\/www.symantec.com\/content\/en\/us\/enterprise\/media\/security _response\/whitepapers\/w32_stuxnet_dossier.pdf.  Nicolas Falliere Liam\u00a0O Murchu and Eric Chien. 2021. W32.Stuxnet Dossier. https:\/\/www.symantec.com\/content\/en\/us\/enterprise\/media\/security _response\/whitepapers\/w32_stuxnet_dossier.pdf."},{"key":"e_1_3_2_1_20_1","unstructured":"fischertechnik 2021. fishcertechnik.de \u2013 Building blocks for life. https:\/\/www.fischertechnik.de  fischertechnik 2021. fishcertechnik.de \u2013 Building blocks for life. https:\/\/www.fischertechnik.de"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Luis Garcia Ferdinand Brasser Mehmet\u00a0Hazar Cintuglu Ahmad-Reza Sadeghi Osama\u00a0A Mohammed and Saman\u00a0A Zonouz. 2017. Hey My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.. In NDSS.  Luis Garcia Ferdinand Brasser Mehmet\u00a0Hazar Cintuglu Ahmad-Reza Sadeghi Osama\u00a0A Mohammed and Saman\u00a0A Zonouz. 2017. Hey My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.. In NDSS.","DOI":"10.14722\/ndss.2017.23313"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302509.3311036"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"L. Garcia S. Zonouz Dong Wei and L.\u00a0P. de Aguiar. 2016. Detecting PLC control corruption via on-device runtime verification. In 2016 Resilience Week (RWS).  L. Garcia S. Zonouz Dong Wei and L.\u00a0P. de Aguiar. 2016. Detecting PLC control corruption via on-device runtime verification. In 2016 Resilience Week (RWS).","DOI":"10.1109\/RWEEK.2016.7573309"},{"volume-title":"Detecting PLC control corruption via on-device runtime verification. In 2016 Resilience Week (RWS)","author":"Garcia Luis","key":"e_1_3_2_1_24_1","unstructured":"Luis Garcia , Saman Zonouz , Dong Wei , and Leandro\u00a0Pfleger De\u00a0Aguiar . 2016. Detecting PLC control corruption via on-device runtime verification. In 2016 Resilience Week (RWS) . IEEE , 67\u201372. Luis Garcia, Saman Zonouz, Dong Wei, and Leandro\u00a0Pfleger De\u00a0Aguiar. 2016. Detecting PLC control corruption via on-device runtime verification. In 2016 Resilience Week (RWS). IEEE, 67\u201372."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106245"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-017-0017-y"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26502-5_2"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00064"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics4040995"},{"key":"e_1_3_2_1_30_1","volume-title":"Jules Ferdinand\u00a0Pagna Disso, and Kevin Jones","author":"Knowles William","year":"2015","unstructured":"William Knowles , Daniel Prince , David Hutchison , Jules Ferdinand\u00a0Pagna Disso, and Kevin Jones . 2015 . A survey of cyber security management in industrial control systems. International journal of critical infrastructure protection 9 (2015), 52\u201380. William Knowles, Daniel Prince, David Hutchison, Jules Ferdinand\u00a0Pagna Disso, and Kevin Jones. 2015. A survey of cyber security management in industrial control systems. International journal of critical infrastructure protection 9 (2015), 52\u201380."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Martin K\u00f6lbl Stefan Leue and Thomas Wies. 2019. Clock Bound Repair for Timed Systems. In Computer Aided Verification.  Martin K\u00f6lbl Stefan Leue and Thomas Wies. 2019. Clock Bound Repair for Timed Systems. In Computer Aided Verification.","DOI":"10.1007\/978-3-030-25540-4_5"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-25540-4_5"},{"key":"e_1_3_2_1_33_1","volume-title":"TarTar: A Timed Automata Repair Tool. In International Conference on Computer Aided Verification. Springer, 529\u2013540","author":"K\u00f6lbl Martin","year":"2020","unstructured":"Martin K\u00f6lbl , Stefan Leue , and Thomas Wies . 2020 . TarTar: A Timed Automata Repair Tool. In International Conference on Computer Aided Verification. Springer, 529\u2013540 . Martin K\u00f6lbl, Stefan Leue, and Thomas Wies. 2020. TarTar: A Timed Automata Repair Tool. In International Conference on Computer Aided Verification. Springer, 529\u2013540."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1520\/SSMS20170006"},{"key":"e_1_3_2_1_35_1","unstructured":"Robert Lee Michael Assante and Tim Conway. 2021. Analysis of the Cyber Attack on the Ukrainian Power Grid. https:\/\/www.nerc.com\/pa\/CI\/ESISAC\/Documents\/E-ISAC_SANS_Ukraine_DUC_18Mar2016.pdf.  Robert Lee Michael Assante and Tim Conway. 2021. Analysis of the Cyber Attack on the Ukrainian Power Grid. https:\/\/www.nerc.com\/pa\/CI\/ESISAC\/Documents\/E-ISAC_SANS_Ukraine_DUC_18Mar2016.pdf."},{"key":"e_1_3_2_1_36_1","unstructured":"R.\u00a0M. Lee M.\u00a0J. Assante and Tim Conway. 2021. German Steel Mill Cyber Attack. https:\/\/ics.sans.org\/media\/ICS-CPPE-case-Study-2-German-Steelworks_Facility.pdf.  R.\u00a0M. Lee M.\u00a0J. Assante and Tim Conway. 2021. German Steel Mill Cyber Attack. https:\/\/ics.sans.org\/media\/ICS-CPPE-case-Study-2-German-Steelworks_Facility.pdf."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653666"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423356"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382244"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23043"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2016.10.603"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Johanna Nellen Erika \u00c1brah\u00e1m and Benedikt Wolters. 2015. A CEGAR Tool for the Reachability Analysis of PLC-Controlled Plants Using Hybrid Automata. In Formalisms for Reuse and Systems Integration.  Johanna Nellen Erika \u00c1brah\u00e1m and Benedikt Wolters. 2015. A CEGAR Tool for the Reachability Analysis of PLC-Controlled Plants Using Hybrid Automata. In Formalisms for Reuse and Systems Integration.","DOI":"10.1007\/978-3-319-16577-6_3"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-016-9671-9"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132748"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642988"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compchemeng.2017.11.004"},{"key":"e_1_3_2_1_47_1","unstructured":"Frances Robles and Nicole Perlroth. 2021. \u2018Dangerous Stuff\u2019: Hackers Tried to Poison Water Supply of Florida Town. https:\/\/www.nytimes.com\/2021\/02\/08\/us\/oldsmar-florida-water-supply-hack.html.  Frances Robles and Nicole Perlroth. 2021. \u2018Dangerous Stuff\u2019: Hackers Tried to Poison Water Supply of Florida Town. https:\/\/www.nytimes.com\/2021\/02\/08\/us\/oldsmar-florida-water-supply-hack.html."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384730"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176319"},{"key":"e_1_3_2_1_50_1","volume-title":"12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Sigurbjarnarson Helgi","year":"2016","unstructured":"Helgi Sigurbjarnarson , James Bornholt , Emina Torlak , and Xi Wang . 2016 . Push-Button Verification of File Systems via Crash Refinement . In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16) . Helgi Sigurbjarnarson, James Bornholt, Emina Torlak, and Xi Wang. 2016. Push-Button Verification of File Systems via Crash Refinement. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)."},{"key":"e_1_3_2_1_51_1","unstructured":"Ruimin Sun Alejandro Mera Long Lu and David Choffnes. 2020. SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses. arXiv preprint arXiv:2006.04806(2020).  Ruimin Sun Alejandro Mera Long Lu and David Choffnes. 2020. SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses. arXiv preprint arXiv:2006.04806(2020)."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660372"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978388"},{"key":"e_1_3_2_1_54_1","volume-title":"23rd International Symposium on Research in Attacks, Intrusions and Defenses ({RAID}","author":"Yang Zeyu","year":"2020","unstructured":"Zeyu Yang , Liang He , Peng Cheng , Jiming Chen , David\u00a0 KY Yau , and Linkang Du . 2020 . PLC-Sleuth: Detecting and Localizing {PLC} Intrusions Using Control Invariants . In 23rd International Symposium on Research in Attacks, Intrusions and Defenses ({RAID} 2020). 333\u2013348. Zeyu Yang, Liang He, Peng Cheng, Jiming Chen, David\u00a0KY Yau, and Linkang Du. 2020. PLC-Sleuth: Detecting and Localizing {PLC} Intrusions Using Control Invariants. In 23rd International Symposium on Research in Attacks, Intrusions and Defenses ({RAID} 2020). 333\u2013348."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22312-0_3"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00034"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3460082","article-title":"A Systematic Framework to Identify Violations of Scenario-dependent Driving Rules in Autonomous Vehicle Software","volume":"5","author":"Zhang Qingzhao","year":"2021","unstructured":"Qingzhao Zhang , David\u00a0Ke Hong , Ze Zhang , Qi\u00a0Alfred Chen , Scott Mahlke , and Z\u00a0Morley Mao . 2021 . A Systematic Framework to Identify Violations of Scenario-dependent Driving Rules in Autonomous Vehicle Software . Proceedings of the ACM on Measurement and Analysis of Computing Systems 5 , 2(2021), 1 \u2013 25 . Qingzhao Zhang, David\u00a0Ke Hong, Ze Zhang, Qi\u00a0Alfred Chen, Scott Mahlke, and Z\u00a0Morley Mao. 2021. A Systematic Framework to Identify Violations of Scenario-dependent Driving Rules in Autonomous Vehicle Software. Proceedings of the ACM on Measurement and Analysis of Computing Systems 5, 2(2021), 1\u201325.","journal-title":"Proceedings of the ACM on Measurement and Analysis of Computing Systems"}],"event":{"name":"RAID 2022: 25th International Symposium on Research in Attacks, Intrusions and Defenses","acronym":"RAID 2022","location":"Limassol Cyprus"},"container-title":["Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545948.3545954","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3545948.3545954","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3545948.3545954","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:27Z","timestamp":1750188627000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545948.3545954"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,26]]},"references-count":55,"alternative-id":["10.1145\/3545948.3545954","10.1145\/3545948"],"URL":"https:\/\/doi.org\/10.1145\/3545948.3545954","relation":{},"subject":[],"published":{"date-parts":[[2022,10,26]]},"assertion":[{"value":"2022-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}