{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:13:27Z","timestamp":1750220007165,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100015165","name":"University Transportation Centers","doi-asserted-by":"publisher","award":["USDOT UTC Grant 69A3552047138"],"award-info":[{"award-number":["USDOT UTC Grant 69A3552047138"]}],"id":[{"id":"10.13039\/100015165","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1929771, CNS-2145493"],"award-info":[{"award-number":["CNS-1929771, CNS-2145493"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3563540","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"3411-3413","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Poster"],"prefix":"10.1145","author":[{"given":"Yunpeng","family":"Luo","sequence":"first","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Ziwen","family":"Wan","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Qi Alfred","family":"Chen","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"volume-title":"eProsima and Clearpath deploying ROS 2 at scale in production systems. (Oct","year":"2019","unstructured":"2019. eProsima and Clearpath deploying ROS 2 at scale in production systems. (Oct . 2019 ). https:\/\/www.eprosima.com\/index.php\/company-all\/news\/124- eprosima-and-clearpath-deploying-ros-2-at-scale-in-production-systems 2019. eProsima and Clearpath deploying ROS 2 at scale in production systems. (Oct. 2019). https:\/\/www.eprosima.com\/index.php\/company-all\/news\/124- eprosima-and-clearpath-deploying-ros-2-at-scale-in-production-systems","key":"e_1_3_2_1_1_1"},{"volume-title":"ROS 2 in Science Robotics. (May","year":"2022","unstructured":"2022. ROS 2 in Science Robotics. (May 2022 ). https:\/\/www.openrobotics.org\/blo g\/2022\/5\/12\/science-robotics-paper 2022. ROS 2 in Science Robotics. (May 2022). https:\/\/www.openrobotics.org\/blo g\/2022\/5\/12\/science-robotics-paper","key":"e_1_3_2_1_2_1"},{"unstructured":"2022. ROS: Home. (2022). https:\/\/www.ros.org\/  2022. ROS: Home. (2022). https:\/\/www.ros.org\/","key":"e_1_3_2_1_3_1"},{"volume-title":"Cryptocurrency Clipboard Hijacker Discovered in PyPI Repository. (Oct","year":"2018","unstructured":"Bertus. 2018. Cryptocurrency Clipboard Hijacker Discovered in PyPI Repository. (Oct . 2018 ). https:\/\/bertusk.medium.com\/cryptocurrency-clipboard-hijacker-discovered-in-pypi-repository-b66b8a534a8 Bertus. 2018. Cryptocurrency Clipboard Hijacker Discovered in PyPI Repository. (Oct. 2018). https:\/\/bertusk.medium.com\/cryptocurrency-clipboard-hijacker-discovered-in-pypi-repository-b66b8a534a8","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","volume-title":"SolarWinds Attack Cost Impacted Companies an Average of $12 Million. (June","author":"Dinu Cezarina","year":"2021","unstructured":"Cezarina Dinu . 2021. SolarWinds Attack Cost Impacted Companies an Average of $12 Million. (June 2021 ). https:\/\/heimdalsecurity.com\/blog\/solarwinds-attack-cost-impacted-companies-an-average-of-12-million\/ Cezarina Dinu. 2021. SolarWinds Attack Cost Impacted Companies an Average of $12 Million. (June 2021). https:\/\/heimdalsecurity.com\/blog\/solarwinds-attack-cost-impacted-companies-an-average-of-12-million\/"},{"key":"e_1_3_2_1_6_1","volume-title":"ABB introduces a new ROS driver for its robot controllers. (Dec","author":"Crowe Steve","year":"2020","unstructured":"Steve Crowe . 2020. ABB introduces a new ROS driver for its robot controllers. (Dec . 2020 ). https:\/\/www.therobotreport.com\/abb-introduced-new-ros-driver-robots\/ Steve Crowe. 2020. ABB introduces a new ROS driver for its robot controllers. (Dec. 2020). https:\/\/www.therobotreport.com\/abb-introduced-new-ros-driver-robots\/"},{"key":"e_1_3_2_1_7_1","volume-title":"iRobot Launches Create 3, with ROS 2 Built In. (April","author":"Ackerman Evan","year":"2022","unstructured":"Evan Ackerman . 2022. iRobot Launches Create 3, with ROS 2 Built In. (April 2022 ). https:\/\/spectrum.ieee.org\/irobot-create-3 Evan Ackerman. 2022. iRobot Launches Create 3, with ROS 2 Built In. (April 2022). https:\/\/spectrum.ieee.org\/irobot-create-3"},{"unstructured":"Sabrina Guillen. 2021. [VIDEO] Spot Joins OTTO AMRs on Test Floor With ROS Integration. (Feb. 2021). https:\/\/clearpathrobotics.com\/blog\/2021\/02\/spot-joins-otto-amrs-on-test-floor-with-ros-integration\/  Sabrina Guillen. 2021. [VIDEO] Spot Joins OTTO AMRs on Test Floor With ROS Integration. (Feb. 2021). https:\/\/clearpathrobotics.com\/blog\/2021\/02\/spot-joins-otto-amrs-on-test-floor-with-ros-integration\/","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","volume-title":"Postmortem for Malicious Packages Published on July 12th","author":"Zhu Henry","year":"2018","unstructured":"Henry Zhu . 2018. Postmortem for Malicious Packages Published on July 12th , 2018 - ESLint - Pluggable JavaScript Linter . (July 2018). https:\/\/eslint.org\/blog\/20 18\/07\/postmortem-for-malicious-package-publishes\/ Henry Zhu. 2018. Postmortem for Malicious Packages Published on July 12th, 2018 - ESLint - Pluggable JavaScript Linter. (July 2018). https:\/\/eslint.org\/blog\/20 18\/07\/postmortem-for-malicious-package-publishes\/"},{"key":"e_1_3_2_1_10_1","volume-title":"A Summary of Census II: Open Source Software Application Libraries the World Depends On. (March","author":"Perlow Jason","year":"2022","unstructured":"Jason Perlow . 2022. A Summary of Census II: Open Source Software Application Libraries the World Depends On. (March 2022 ). https:\/\/www.linuxfoundation.or g\/blog\/a-summary-of-census-ii-open-source-software-application-libraries- the-world-depends-on\/ Jason Perlow. 2022. A Summary of Census II: Open Source Software Application Libraries the World Depends On. (March 2022). https:\/\/www.linuxfoundation.or g\/blog\/a-summary-of-census-ii-open-source-software-application-libraries- the-world-depends-on\/"},{"key":"e_1_3_2_1_11_1","first-page":"2019","volume":"201","unstructured":"Jussi Koljonen. 201 9. [CVE- 2019 - 15224 ] Version 1.6.13 published with malicious backdoor. (Aug. 2019). https:\/\/github.com\/rest-client\/rest-client\/issues\/713 Jussi Koljonen. 2019. [CVE-2019-15224] Version 1.6.13 published with malicious backdoor. (Aug. 2019). https:\/\/github.com\/rest-client\/rest-client\/issues\/713","journal-title":"Jussi Koljonen."},{"doi-asserted-by":"crossref","unstructured":"V\u0131ctor Mayoral-Vilches Ruffin White Gianluca Caiazza and Mikael Arguedas. 2022. SROS2: Usable Cyber Security Tools for ROS 2. (2022).  V\u0131ctor Mayoral-Vilches Ruffin White Gianluca Caiazza and Mikael Arguedas. 2022. SROS2: Usable Cyber Security Tools for ROS 2. (2022).","key":"e_1_3_2_1_12_1","DOI":"10.1109\/IROS47612.2022.9982129"},{"unstructured":"ros. 2022. rosdistro. (2022). https:\/\/github.com\/ros\/rosdistro  ros. 2022. rosdistro. (2022). https:\/\/github.com\/ros\/rosdistro","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","volume-title":"Static-Time Extraction and Analysis of the ROS Computation Graph. In IRC","author":"Santos Andre","year":"2019","unstructured":"Andre Santos , Alcino Cunha , and Nuno Macedo . 2019 . Static-Time Extraction and Analysis of the ROS Computation Graph. In IRC 2019. IEEE, Naples, Italy. Andre Santos, Alcino Cunha, and Nuno Macedo. 2019. Static-Time Extraction and Analysis of the ROS Computation Graph. In IRC 2019. IEEE, Naples, Italy."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1109\/IROS.2016.7759661"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/2892208.2892235"},{"key":"e_1_3_2_1_17_1","volume-title":"Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects","author":"Wermke Dominik","year":"2022","unstructured":"Dominik Wermke , Noah W\u00f6hler , Jan H. Klemmer , Marcel Fourn\u00e9 , Yasemin Acar , and Sascha Fahl . 2022. Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects . In IEEE S &P 2022 . Dominik Wermke, Noah W\u00f6hler, Jan H. Klemmer, Marcel Fourn\u00e9, Yasemin Acar, and Sascha Fahl. 2022. Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects. In IEEE S&P 2022."},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. Oakland","author":"Wu Qiushi","year":"2021","unstructured":"Qiushi Wu and Kangjie Lu . 2021 . On the feasibility of stealthily introducing vulnerabilities in open-source software via hypocrite commits . In Proc. Oakland Qiushi Wu and Kangjie Lu. 2021. On the feasibility of stealthily introducing vulnerabilities in open-source software via hypocrite commits. In Proc. Oakland"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"CCS '22","name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","location":"Los Angeles CA USA"},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3563540","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3563540","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3563540","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:06Z","timestamp":1750182666000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3563540"}},"subtitle":["Towards Complete Computation Graph Generation for Security Assessment of ROS Applications"],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":18,"alternative-id":["10.1145\/3548606.3563540","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3563540","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}