{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:12:40Z","timestamp":1750219960026,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,8]],"date-time":"2022-11-08T00:00:00Z","timestamp":1667865600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"PETRAS","award":["RoasT-IoT"],"award-info":[{"award-number":["RoasT-IoT"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,11]]},"DOI":"10.1145\/3560835.3564552","type":"proceedings-article","created":{"date-parts":[[2022,11,9]],"date-time":"2022-11-09T02:38:26Z","timestamp":1667961506000},"page":"25-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Preventing or Mitigating Adversarial Supply Chain Attacks"],"prefix":"10.1145","author":[{"given":"Kaspar Rosager","family":"Ludvigsen","sequence":"first","affiliation":[{"name":"University of Newcastle and University of Strathclyde, Newcastle and Glasgow, United Kingdom"}]},{"given":"Shishir","family":"Nagaraja","sequence":"additional","affiliation":[{"name":"University of Newcastle, Newcastle, United Kingdom"}]},{"given":"Angela","family":"Daly","sequence":"additional","affiliation":[{"name":"University of Dundee, Dundee, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2022,11,8]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.4018\/978--1--7998--7323--5.ch009"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1016\/j.chb.2020.106531"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1080\/01611194.2021.2002977"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1111\/gove.12309"},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robots\". In","author":"Tamara Bonaci","year":"2015","unstructured":"Tamara Bonaci et al. \"To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robots\". In: (2015). _eprint: 1504.04339, pp. 1--11. url: http:\/\/arxiv.org\/abs\/1504.04339."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.6028\/NIST.SP.800-161r1-draft2"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1007\/978--3--319--78440--3_38"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1038\/s41746-021-00403-w"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1080\/23738871.2018.1550523"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1365\/s43439-021-00043--6"},{"key":"e_1_3_2_1_11_1","first-page":"19","article-title":"Cyber Supply Chain Risk Management:Toward a Global Vision of Transparency and Trust. Tech. rep","author":"Charney Scott","year":"2011","unstructured":"Scott Charney and Eric T Werner. Cyber Supply Chain Risk Management:Toward a Global Vision of Transparency and Trust. Tech. rep. Microsoft, 2011, p. 19. url: http:\/\/download. microsoft.com\/download\/3\/8\/4\/384483BA- B7B3- 4F2F- 9366- E83E4C7562D6\/Cyber% 20Supply%20Chain%20Risk%20Management%20white%20paper.pdf.","journal-title":"Microsoft"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1515\/9781400845293"},{"key":"e_1_3_2_1_13_1","volume-title":"Supply Chain Management 27.1","author":"Alessandro Creazza","year":"2022","unstructured":"Alessandro Creazza et al. \"Who cares? Supply chain managers' perceptions regarding cyber supply chain risk management in the digital transformation era\". en. In: Supply Chain Management 27.1 (2022), p. 24."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1177\/2043886921993126"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.3390\/s20185165"},{"key":"e_1_3_2_1_16_1","volume-title":"Santa Clara High Technology Law Journal 36.4","author":"Duan Charles","year":"2020","unstructured":"Charles Duan. \"OF MONOPOLIES AND MONOCULTURES: THE INTERSECTION OF PATENTS AND NATIONAL SECURITY\". en. In: Santa Clara High Technology Law Journal 36.4 (2020), p. 39."},{"key":"e_1_3_2_1_17_1","volume-title":"A Competition Law Perspective","author":"Economides Nick","year":"2019","unstructured":"Nick Economides and Ioannis Lianos. \"Restrictions on Privacy and Exploitation in the Digital Economy: A Competition Law Perspective\". In: CLES Research Paper Series (2019)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1016\/j.net.2020.08.021"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.13182\/T122--32483"},{"key":"e_1_3_2_1_20_1","first-page":"267","volume-title":"Cryptologia 23.3 (July","author":"Ellis J. H.","year":"1999","unstructured":"J. H. Ellis. \"THE HISTORY OF NON-SECRET ENCRYPTION\". en. In: Cryptologia 23.3 (July 1999), pp. 267--273. issn: 0161--1194, 1558--1586. doi: 10.1080 \/0161- 119991887919. url: http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/0161--119991887919 (visited on 08\/04\/2022)."},{"key":"e_1_3_2_1_21_1","volume-title":"rep. 1.4. Symantec","author":"Falliere Nicolas","year":"2011","unstructured":"Nicolas Falliere, Liam O. Murchu, and Eric Chien. W32.Stuxnet Dossier. Tech. rep. 1.4. Symantec, 2011."},{"issue":"1","key":"e_1_3_2_1_22_1","article-title":"Is Brexit Ripping up the Unwritten Constitution of the United Kingdom?","volume":"11","author":"Frosini Justin O.","year":"2019","unstructured":"Justin O. Frosini. \"Is Brexit Ripping up the Unwritten Constitution of the United Kingdom?\" In: Italian Journal of Public Law 11.1 (2019).","journal-title":"Italian Journal of Public Law"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.5195\/TLP.2014.146"},{"issue":"2","key":"e_1_3_2_1_24_1","article-title":"CYBERSECURITY FOR INFRASTRUCTURE: A CRITICAL ANALYSIS","volume":"44","author":"Haber Eldar","year":"2017","unstructured":"Eldar Haber and Tal Zarsky. \"CYBERSECURITY FOR INFRASTRUCTURE: A CRITICAL ANALYSIS\". In: Florida State University Law Review 44.2 (2017).","journal-title":"Florida State University Law Review"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1080\/24701475.2017.1387466"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1007\/978--3-030--31239--8_6"},{"key":"e_1_3_2_1_27_1","volume-title":"Misaligned Union laws\" A comparative analysis of certification in the Cybersecurity Act and the General Data Protection Regulation. en","author":"Kamara Irene","year":"2021","unstructured":"Irene Kamara. Misaligned Union laws\" A comparative analysis of certification in the Cybersecurity Act and the General Data Protection Regulation. en. 2021."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.2139\/ssrn.3338155"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1587\/transinf.2015ICI0001"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.15845\/bjclcj.v10i1.3689"},{"key":"e_1_3_2_1_31_1","first-page":"3","volume-title":"13th International Workshop on Agents and Data Mining Interaction.","author":"LaGreca Elizabeth","year":"2017","unstructured":"Elizabeth LaGreca and Chutima Boonthum-Denecke. \"Survey on the Insecurity of the Internet of Things\". en. In: 13th International Workshop on Agents and Data Mining Interaction. 2017, p. 3."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1145\/202709"},{"key":"e_1_3_2_1_33_1","volume-title":"American Criminal Law Review 57.2","author":"Robert Luskin. ?'Caring about Corp","year":"2020","unstructured":"Robert Luskin. ?'Caring about Corporate 'Due Care': Why Criminal Respondeat Superior Liability Outreaches Its Justification\". en. In: American Criminal Law Review 57.2 (2020), p. 29."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1017\/S1816383122000194"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1109\/MSP.2016.48"},{"key":"e_1_3_2_1_36_1","first-page":"519","volume-title":"TransNav, the International Journal on Marine Navigation and Safety of Sea Transportation 15.3","author":"Meland Per H\u00c1kon","year":"2021","unstructured":"Per H\u00c1kon Meland et al. \"A Retrospective Analysis of Maritime Cyber Security Incidents\". en. In: TransNav, the International Journal on Marine Navigation and Safety of Sea Transportation 15.3 (2021), pp. 519--530. issn: 2083--6473. doi: 10.12716 \/1001.15.03.04. url: http: \/ \/www. transnav.eu \/Article_A_Retrospective_Analysis_ of_Maritime_Cyber_ Security_Incidents_Meland,59,1144.html (visited on 08\/05\/2022)."},{"key":"e_1_3_2_1_37_1","first-page":"86","volume-title":"MITRE","author":"Miller John F","year":"2013","unstructured":"John F Miller. Supply Chain Attack Framework and Attack Patterns. Tech. rep. December 2013. MITRE, 2013, p. 86. url: https:\/\/apps.dtic.mil\/sti\/pdfs\/ADA610495.pdf."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_38_1","DOI":"10.1109\/ICIT45562.2020.9067229"},{"key":"e_1_3_2_1_39_1","first-page":"6","volume-title":"(2019)","author":"H","unstructured":"H D Nguyen et al. \"Industrial Internet of Things, Big Data, and Artificial Intelligence in the Smart Factory: a survey and perspective\". en. In: (2019), p. 6."},{"key":"e_1_3_2_1_40_1","first-page":"1","article-title":"rep","author":"Cyber-Physical Systems NSF.","year":"2014","unstructured":"NSF. Cyber-Physical Systems. Tech. rep. National Science Foundation, 2014, pp. 1--20.","journal-title":"National Science Foundation"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_41_1","DOI":"10.1177\/1462474508098133"},{"key":"e_1_3_2_1_42_1","first-page":"61","volume-title":"Journal of Criminology and Criminal Law 60.1","author":"Pisaric Milana","year":"2022","unstructured":"Milana Pisaric. \"Communications Encryption as an Investigative Obstacle\". en. In: Journal of Criminology and Criminal Law 60.1 (2022), pp. 61--74. (Visited on 08\/04\/2022)."},{"volume-title":"Dec.","year":"2021","unstructured":"PricewaterhouseCoopers. Conti cyber attack on the HSE. Independent Post Incident Review. HSE Board in conjunction with the CEO and Executive Management Team, Dec. 2021.","key":"e_1_3_2_1_43_1"},{"key":"e_1_3_2_1_44_1","first-page":"88","article-title":"Supply Chain Attack Patterns : Framework and Catalog. Tech. rep","author":"Reed Melinda","year":"2014","unstructured":"Melinda Reed, John F Miller, and Paul Popick. Supply Chain Attack Patterns : Framework and Catalog. Tech. rep. OFFICE OF THE DEPUTY ASSISTANT SECRETARY OF DEFENSE FOR SYSTEMS ENGINEERING, 2014, p. 88. url: https:\/\/citeseerx.ist.psu.edu\/viewdoc\/ download?doi=10.1.1.648.6043&rep=rep1&type=pdf.","journal-title":"OFFICE OF THE DEPUTY ASSISTANT SECRETARY OF DEFENSE FOR SYSTEMS ENGINEERING"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_45_1","DOI":"10.1145\/3538704"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_46_1","DOI":"10.1007\/s41125-"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_47_1","DOI":"10.5750\/dlj.v2i1.163"},{"key":"e_1_3_2_1_48_1","volume-title":"A COMPARISON OF \"VOLUNTARY\" CYBERSECURITY FRAMEWORKS\". en. In: 16","author":"Shackelford J","year":"2016","unstructured":"J Shackelford, Scott Russell, and Jeffrey Haut. \"BOTTOMS UP: A COMPARISON OF \"VOLUNTARY\" CYBERSECURITY FRAMEWORKS\". en. In: 16 (2016), p. 45."},{"key":"e_1_3_2_1_49_1","volume-title":"Journal of Criminal Law and Criminology 72.2","author":"W Allen Spurgeon and Terence P Fagan. \"Criminal Liability for Life-Endangering Corp","year":"1981","unstructured":"W Allen Spurgeon and Terence P Fagan. \"Criminal Liability for Life-Endangering Corporate Conduct\". en. In: Journal of Criminal Law and Criminology 72.2 (1981), p. 35."},{"key":"e_1_3_2_1_50_1","volume-title":"Executive Order on America's Supply Chains: A Year of Action and Progresss. Tech. rep","author":"Sullivan Jake","year":"2022","unstructured":"Jake Sullivan and Brian Deese. Executive Order on America's Supply Chains: A Year of Action and Progresss. Tech. rep. White House, 2022, cyber. url: https:\/\/www.whitehouse.gov\/wpcontent\/uploads\/2022\/02\/Capstone-Report-Biden.pdf."},{"key":"e_1_3_2_1_51_1","first-page":"162","volume-title":"Kaohsiung","author":"Suryotrisongko Hatma","year":"2019","unstructured":"Hatma Suryotrisongko and Yasuo Musashi. \"Review of Cybersecurity Research Topics, Taxonomy and Challenges: Interdisciplinary Perspective\". en. In: Kaohsiung, Taiwan: IEEE, Nov. 2019, pp. 162--167. (Visited on 08\/04\/2022)"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"CCS '22","name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","location":"Los Angeles CA USA"},"container-title":["Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3560835.3564552","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3560835.3564552","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:09Z","timestamp":1750182549000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3560835.3564552"}},"subtitle":["A Legal Analysis"],"short-title":[],"issued":{"date-parts":[[2022,11,8]]},"references-count":51,"alternative-id":["10.1145\/3560835.3564552","10.1145\/3560835"],"URL":"https:\/\/doi.org\/10.1145\/3560835.3564552","relation":{},"subject":[],"published":{"date-parts":[[2022,11,8]]},"assertion":[{"value":"2022-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}