{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T07:29:35Z","timestamp":1776410975981,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NYU Abu Dhabi Global PhD Fellowship"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,26]]},"DOI":"10.1145\/3605758.3623499","type":"proceedings-article","created":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T01:52:11Z","timestamp":1700704331000},"page":"83-89","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Towards PLC-Specific Binary Analysis Tools: An Investigation of Codesys-Compiled PLC Software Applications"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5511-3182","authenticated-orcid":false,"given":"Hadjer","family":"Benkraouda","sequence":"first","affiliation":[{"name":"Center for Cyber Security, New York University Abu Dhabi &amp; University of Illinois Urbana-Champaign, Urbana, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-5627-195X","authenticated-orcid":false,"given":"Anand","family":"Agrawal","sequence":"additional","affiliation":[{"name":"Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, UAE"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1172-0620","authenticated-orcid":false,"given":"Dimitrios","family":"Tychalas","sequence":"additional","affiliation":[{"name":"Center for Cyber Security, New York University Abu Dhabi, New York City, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-0074-1908","authenticated-orcid":false,"given":"Marios","family":"Sazos","sequence":"additional","affiliation":[{"name":"Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, UAE"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6899-0651","authenticated-orcid":false,"given":"Michail","family":"Maniatakos","sequence":"additional","affiliation":[{"name":"Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, UAE"}]}],"member":"320","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134618"},{"key":"e_1_3_2_1_2_1","unstructured":"Bernhard Werner. 2010. Codesys Compiler optimization. https:\/\/forum.codesys.com\/viewtopic.php?t=5384."},{"key":"e_1_3_2_1_3_1","volume-title":"Ryan Pickren, Burak Sahin, Saman Zonouz, and Michail Maniatakos.","author":"Doumanidis Constantine","year":"2023","unstructured":"Constantine Doumanidis, Yongyu Xie, Prashant HN Rajput, Ryan Pickren, Burak Sahin, Saman Zonouz, and Michail Maniatakos. 2023. Dissecting the Industrial Control Systems Software Supply Chain. IEEE Security & Privacy (2023)."},{"key":"e_1_3_2_1_4_1","volume-title":"Ahmad-Reza Sadeghi, Osama A Mohammed, and Saman A Zonouz.","author":"Garcia Luis","year":"2017","unstructured":"Luis Garcia, Ferdinand Brasser, Mehmet Hazar Cintuglu, Ahmad-Reza Sadeghi, Osama A Mohammed, and Saman A Zonouz. 2017. Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.. In NDSS."},{"key":"e_1_3_2_1_5_1","volume-title":"Understanding the IEC61131--3 Programming Languages. https:\/\/www.automation.com\/pdf_articlesIEC_Programming_Thayer_L.pdf Retrieved","author":"Rexroth Bosch Group","year":"2019","unstructured":"Rexroth Bosch Group. 2012. Understanding the IEC61131--3 Programming Languages. https:\/\/www.automation.com\/pdf_articlesIEC_Programming_Thayer_L.pdf Retrieved May 28, 2019 from"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","unstructured":"K.-H John and M Tiegelkamp. 2010. IEC 61131--3: Programming industrial automation systems: Concepts and programming languages requirements for programming systems decision-making aids. 1--390 pages. https:\/\/doi.org\/10.1007\/978--3--642--12015--2","DOI":"10.1007\/978--3--642--12015--2"},{"key":"e_1_3_2_1_7_1","volume-title":"ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries. ArXiv","author":"Keliris Anastasis","year":"2018","unstructured":"Anastasis Keliris and Michail Maniatakos. 2018. ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries. ArXiv , Vol. abs\/1812.03478 (2018). https:\/\/api.semanticscholar.org\/CorpusID:54462386"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23043"},{"key":"e_1_3_2_1_9_1","unstructured":"P. Rajput C. Doumanidis and M. Maniatakos. 2023. ICSPatch: Automated Vulnerability Localization and Non-Intrusive Hotpatching in Industrial Control Systems using Data Dependence Graphs. In USENIX Security."},{"key":"e_1_3_2_1_10_1","volume-title":"IEEE European Symposium on Security and Privacy (EuroS&P). 369--384","author":"Rajput P.","unstructured":"P. Rajput, E. Sarkar, D. Tychalas, and M. Maniatakos. 2021. Remote Non-Intrusive Malware Detection for PLCs based on Chain of Trust Rooted in Hardware. In IEEE European Symposium on Security and Privacy (EuroS&P). 369--384."},{"key":"e_1_3_2_1_11_1","unstructured":"Slimm et al. 2015. Checksec. https:\/\/github.com\/slimm609\/checksec.sh."},{"key":"e_1_3_2_1_12_1","unstructured":"Technavio. 2015. Global PLC Hardware Market 2016--2020. Technavio Information Technology Research."},{"key":"e_1_3_2_1_13_1","unstructured":"Technavio. 2015. Global PLC Software Market 2016--2020. Technavio Information Technology Research."},{"key":"e_1_3_2_1_14_1","unstructured":"Technavio. 2017. CODESYS Control Manual. https:\/\/help.codesys.com\/api-content\/2\/codesys\/3.5.12.0\/en\/_cds_struct_reference_datatypes\/."},{"key":"e_1_3_2_1_15_1","unstructured":"D. Tychalas H. Benkraouda and M. Maniatakos. 2021. ICSFuzz: Manipulating I\/Os and Repurposing Binary Code to Enable Instrumented Fuzzing in ICS Control Applications. In USENIX Security. 2847--2862."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978388"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522728"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00034"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.113"}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","location":"Copenhagen Denmark","acronym":"CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 5th Workshop on CPS&amp;IoT Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605758.3623499","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605758.3623499","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:10Z","timestamp":1750178770000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605758.3623499"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,26]]},"references-count":19,"alternative-id":["10.1145\/3605758.3623499","10.1145\/3605758"],"URL":"https:\/\/doi.org\/10.1145\/3605758.3623499","relation":{},"subject":[],"published":{"date-parts":[[2023,11,26]]},"assertion":[{"value":"2023-11-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}