{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T08:44:04Z","timestamp":1775897044701,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001381","name":"National Research Foundation Singapore","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1145\/3634737.3645002","type":"proceedings-article","created":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T11:51:38Z","timestamp":1719575498000},"page":"947-961","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic Controllers"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-8051-5141","authenticated-orcid":false,"given":"Zhiang","family":"Li","sequence":"first","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1946-1790","authenticated-orcid":false,"given":"Daisuke","family":"Mashima","sequence":"additional","affiliation":[{"name":"Illinois Advanced Research Center at Singapore, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-4411-0226","authenticated-orcid":false,"given":"Wen Shei","family":"Ong","sequence":"additional","affiliation":[{"name":"Illinois Advanced Research Center at Singapore, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3290-2514","authenticated-orcid":false,"given":"Ertem","family":"Esiner","sequence":"additional","affiliation":[{"name":"Illinois Advanced Research Center at Singapore, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-6040-6865","authenticated-orcid":false,"given":"Zbigniew","family":"Kalbarczyk","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4613-0866","authenticated-orcid":false,"given":"Ee-Chien","family":"Chang","sequence":"additional","affiliation":[{"name":"School of Computing, National University of Singapore, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2024,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2005.95748"},{"key":"e_1_3_2_1_2_1","unstructured":"2010. GlobalPlatform: TEE Client API Specification v1.0. https:\/\/globalplatform.org\/specs-library\/tee-client-api-specification\/"},{"key":"e_1_3_2_1_3_1","unstructured":"2018. GlobalPlatform: TEE Internal Core API Specification v1.1.2. https:\/\/globalplatform.org\/specs-library\/tee-internal-core-api-specification\/"},{"key":"e_1_3_2_1_4_1","unstructured":"2018. PLC features dual-core 800MHz ARM Cortex processor. https:\/\/www.engineeringspecifier.com\/control-systems\/plc-features-dual-core-800mhz-arm-cortex-processor"},{"key":"e_1_3_2_1_5_1","unstructured":"2020. Platform Security Boot Guide. https:\/\/developer.arm.com\/documentation\/den0072\/"},{"key":"e_1_3_2_1_6_1","unstructured":"2021. GlobalPlatform TEE Sockets API Specification V1.0. https:\/\/globalplatform.org\/specs-library\/tee-sockets-api-specification\/"},{"key":"e_1_3_2_1_7_1","unstructured":"2021. WAGO 750-8212 PFC200 G2 2ETH RS 03.05.10(17) USER COOKIE ACCESS CONTROL. https:\/\/vuldb.com\/?id.193199"},{"key":"e_1_3_2_1_8_1","unstructured":"2022. ICS-CERT Advisories. https:\/\/www.cisa.gov\/uscert\/ics\/advisories"},{"key":"e_1_3_2_1_9_1","unstructured":"2022. libmodbus: A Modbus library for Linux Mac OS FreeBSD and Windows. https:\/\/libmodbus.org\/"},{"key":"e_1_3_2_1_10_1","unstructured":"2022. Open Portable Trusted Execution Environment. https:\/\/www.op-tee.org\/"},{"key":"e_1_3_2_1_11_1","unstructured":"2022. Programmable Logic Controller (PLC) Scan Time- Types Theory. https:\/\/www.electricalvolt.com\/2022\/07\/programmable-logic-controller-plc-scan-time\/#:~:text=The%20Scan%20cycle%20of%20a a%20PLC%20is%20continuously%20running."},{"key":"e_1_3_2_1_12_1","unstructured":"2022. pyModbus: A Python Modbus Stack. https:\/\/github.com\/riptideio\/pymodbus\/"},{"key":"e_1_3_2_1_13_1","unstructured":"2022. WolfSSL: Embedded TLS Library for Applications Devices IoT and the Cloud. https:\/\/www.wolfssl.com\/"},{"key":"e_1_3_2_1_14_1","unstructured":"2023. CONTROLLERS. https:\/\/www.mitsubishielectric.com\/fa\/dctlg\/catalog\/01\/pdf\/cnt.pdf"},{"key":"e_1_3_2_1_15_1","unstructured":"2023. Cortex-A8 Technical Reference Manual. https:\/\/developer.arm.com\/documentation\/ddi0344\/b\/programmer-s-model\/trustzone-technology"},{"key":"e_1_3_2_1_16_1","unstructured":"2023. Critical Vulnerabilities Allow Hackers to Take Full Control of Wago PLCs. https:\/\/www-securityweek-com.cdn.ampproject.org\/c\/s\/www.securityweek.com\/critical-vulnerabilities-allow-hackers-to-take-full-control-of-wago-plcs\/amp\/"},{"key":"e_1_3_2_1_17_1","unstructured":"2023. PLC Automation. https:\/\/new.abb.com\/docs\/librariesprovider104\/pact-china-brochure-library\/3adr020077c0204-rev-b-plc-automation.pdf?sfvrsn"},{"key":"e_1_3_2_1_18_1","unstructured":"2023. WAGO PFC 200 Controller. https:\/\/www.wago.com\/sg\/automation-technology\/discover-plcs\/pfc200"},{"key":"e_1_3_2_1_19_1","first-page":"1","article-title":"Ghost in the plc designing an undetectable programmable logic controller rootkit via pin control attack","volume":"2016","author":"Abbasi Ali","year":"2016","unstructured":"Ali Abbasi and Majid Hashemi. 2016. Ghost in the plc designing an undetectable programmable logic controller rootkit via pin control attack. Black Hat Europe 2016 (2016), 1--35.","journal-title":"Black Hat Europe"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134618"},{"key":"e_1_3_2_1_21_1","volume-title":"Nandha Kumar Kandasamy, and Aditya Mathur","author":"Adepu Sridhar","year":"2018","unstructured":"Sridhar Adepu, Nandha Kumar Kandasamy, and Aditya Mathur. 2018. Epic: An electric power testbed for research and training in cyber physical systems security. In Computer Security. Springer, 37--52."},{"key":"e_1_3_2_1_23_1","first-page":"131","article-title":"OpenPLC","volume":"61","author":"Alves Thiago","year":"2018","unstructured":"Thiago Alves and Thomas Morris. 2018. OpenPLC: An IEC 61,131--3 compliant open source industrial controller for cyber security research. Computers & Security 78 (2018), 364--379.","journal-title":"An IEC"},{"key":"e_1_3_2_1_24_1","volume-title":"FreeRTOS. Internet","author":"Richard","year":"2008","unstructured":"Richard Barry et al. 2008. FreeRTOS. Internet, Oct 4 (2008)."},{"key":"e_1_3_2_1_25_1","volume-title":"2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm). IEEE, 1--7.","author":"Bohara Atul","year":"2020","unstructured":"Atul Bohara, Jordi Ros-Giralt, Ghada Elbez, Alfonso Valdes, Klara Nahrstedt, and William H Sanders. 2020. ED4GAP: Efficient detection for GOOSE-based poisoning attacks on IEC 61850 substations. In 2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm). IEEE, 1--7."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 4th Workshop on System Software for Trusted Execution. 1--6.","author":"Busch Marcel","year":"2019","unstructured":"Marcel Busch, Ralph Schlenk, and Hans Heckel. 2019. TEEMo: trusted peripheral monitoring for optical networks and beyond. In Proceedings of the 4th Workshop on System Software for Trusted Execution. 1--6."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61204-1_33"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3471621.3471864"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134621"},{"key":"e_1_3_2_1_30_1","volume-title":"IEC tc57 wg15: IEC 62351 security standards for the power system information infrastructure. White Paper","author":"Cleveland Frances","year":"2012","unstructured":"Frances Cleveland. 2012. IEC tc57 wg15: IEC 62351 security standards for the power system information infrastructure. White Paper (2012)."},{"key":"e_1_3_2_1_31_1","first-page":"27","article-title":"MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones","volume":"26","author":"Davi Lucas","year":"2012","unstructured":"Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan N\u00fcrnberger, and Ahmad-Reza Sadeghi. 2012. MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.. In NDSS, Vol. 26. 27--40.","journal-title":"NDSS"},{"key":"e_1_3_2_1_32_1","unstructured":"Mario de Sousa. 2001. MATIEC - IEC 61131-3 compiler. https:\/\/openplcproject.gitlab.io\/matiec\/"},{"key":"e_1_3_2_1_33_1","unstructured":"Defence Use Case. 2016. Analysis of the Cyber Attack on the Ukrainian Power Grid. (2016)."},{"key":"e_1_3_2_1_34_1","volume-title":"ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings 32","author":"Denzel Michael","year":"2017","unstructured":"Michael Denzel, Mark Ryan, and Eike Ritter. 2017. A malware-tolerant, self-healing industrial control system framework. In ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings 32. Springer, 46--60."},{"key":"e_1_3_2_1_35_1","first-page":"1","article-title":"TRITON: The first ICS cyber attack on safety instrument systems","volume":"2018","author":"Pinto Alessandro Di","year":"2018","unstructured":"Alessandro Di Pinto, Younes Dragoni, and Andrea Carcano. 2018. TRITON: The first ICS cyber attack on safety instrument systems. In Proc. Black Hat USA, Vol. 2018. 1--26.","journal-title":"Proc. Black Hat USA"},{"key":"e_1_3_2_1_36_1","volume-title":"2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm). IEEE, 1--7.","author":"Esiner Ertem","year":"2019","unstructured":"Ertem Esiner, Daisuke Mashima, Binbin Chen, Zbigniew Kalbarczyk, and David Nicol. 2019. F-Pro: A fast and flexible provenance-aware message authentication scheme for smart grid. In 2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm). IEEE, 1--7."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2022.3156897"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3607194"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23313"},{"key":"e_1_3_2_1_40_1","volume-title":"22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID","author":"Ghaeini Hamid Reza","year":"2019","unstructured":"Hamid Reza Ghaeini, Matthew Chan, Raad Bahmani, Ferdinand Brasser, Luis Garcia, Jianying Zhou, Ahmad-Reza Sadeghi, Nils Ole Tippenhauer, and Saman Zonouz. 2019. {PAtt}: Physics-based Attestation of Control Systems. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). 165--180."},{"key":"e_1_3_2_1_41_1","volume-title":"GateKeeper: Operator-centric Trusted App Management Framework on ARM TrustZone. In 2022 IEEE Conference on Communications and Network Security (CNS). IEEE, 100--108","author":"Gowrisankar Balachandar","year":"2022","unstructured":"Balachandar Gowrisankar, Daisuke Mashima, Wenshei Ong, Quanqi Ye, Ertem Esiner, Binbin Chen, and Zbigniew Kalbarczyk. 2022. GateKeeper: Operator-centric Trusted App Management Framework on ARM TrustZone. In 2022 IEEE Conference on Communications and Network Security (CNS). IEEE, 100--108."},{"key":"e_1_3_2_1_42_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Hua Zhichao","year":"2017","unstructured":"Zhichao Hua, Jinyu Gu, Yubin Xia, Haibo Chen, Binyu Zang, and Haibing Guan. 2017. {vTZ}: Virtualizing {ARM} {TrustZone}. In 26th USENIX Security Symposium (USENIX Security 17). 541--556."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2956734"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2957828"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-019-0038-7"},{"key":"e_1_3_2_1_46_1","unstructured":"Eduard Kovacs. 2014. OpenVPN Vulnerable to ShellShock Attacks: Researcher. https:\/\/www.securityweek.com\/openvpn-vulnerable-shellshock-attacks-researcher"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop. 1--4.","author":"Lin Hui","year":"2013","unstructured":"Hui Lin, Adam Slagell, Catello Di Martino, Zbigniew Kalbarczyk, and Ravishankar K Iyer. 2013. Adapting bro into scada: building a specification-based intrusion detection system for the dnp3 protocol. In Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop. 1--4."},{"key":"e_1_3_2_1_49_1","volume-title":"Cybersecurity for Modern Smart Grid Against Emerging Threats. Foundations and Trends\u00ae in Privacy and Security 5, 4","author":"Mashima Daisuke","year":"2023","unstructured":"Daisuke Mashima, Yao Chen, Muhammad M Roomi, Subhash Lakshminarayana, and Deming Chen. 2023. Cybersecurity for Modern Smart Grid Against Emerging Threats. Foundations and Trends\u00ae in Privacy and Security 5, 4 (2023), 189--285."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/CySWater.2016.7469060"},{"key":"e_1_3_2_1_51_1","volume-title":"Proceedings of the 29th Annual Computer Security Applications Conference. 309--318","author":"Pewny Jannik","year":"2013","unstructured":"Jannik Pewny and Thorsten Holz. 2013. Control-flow restrictor: Compiler-based CFI for iOS. In Proceedings of the 29th Annual Computer Security Applications Conference. 309--318."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3291047"},{"key":"e_1_3_2_1_53_1","volume-title":"2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm). IEEE, 1--7.","author":"Ren Wenyu","year":"2018","unstructured":"Wenyu Ren, Timothy Yardley, and Klara Nahrstedt. 2018. Edmand: edge-based multi-level anomaly detection for scada networks. In 2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm). IEEE, 1--7."},{"key":"e_1_3_2_1_54_1","unstructured":"Julian Rrushi Hassan Farhangi Clay Howey Kelly Carmichael and Joey Dabell. 2015. A quantitative evaluation of the target selection of havex ics malware plugin. In Industrial control system security (ICSS) workshop."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.357"},{"key":"e_1_3_2_1_56_1","volume-title":"Machine Learning Assisted Bad Data Detection for High-throughput Substation Communication. arXiv preprint arXiv:2302.05949","author":"Sourav Suman","year":"2023","unstructured":"Suman Sourav, Partha P Biswas, Vyshnavi Mohanraj, Binbin Chen, and Daisuke Mashima. 2023. Machine Learning Assisted Bad Data Detection for High-throughput Substation Communication. arXiv preprint arXiv:2302.05949 (2023)."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-021-00413-y"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796697"},{"key":"e_1_3_2_1_59_1","volume-title":"IEEE INFOCOM 2022-IEEE Conference on Computer Communications. IEEE, 1039--1048","author":"Tefek Utku","year":"2022","unstructured":"Utku Tefek, Ertem Esiner, Daisuke Mashima, Binbin Chen, and Yih-Chun Hu. 2022. Caching-based multicast message authentication in time-critical industrial control systems. In IEEE INFOCOM 2022-IEEE Conference on Computer Communications. IEEE, 1039--1048."},{"key":"e_1_3_2_1_60_1","volume-title":"IEC 61131-3: Programming industrial automation systems","author":"Tiegelkamp Michael","unstructured":"Michael Tiegelkamp and Karl-Heinz John. 2010. IEC 61131-3: Programming industrial automation systems. Vol. 166. Springer."},{"key":"e_1_3_2_1_61_1","volume-title":"Proceedings of the 2th Workshop on CPS&IoT Security and Privacy. 3--14","author":"Tippenhauer Nils Ole","year":"2021","unstructured":"Nils Ole Tippenhauer, Binbin Chen, Daisuke Mashima, and David M Nicol. 2021. vBump: Securing Ethernet-based Industrial Control System Networks with VLAN-based Traffic Aggregation. In Proceedings of the 2th Workshop on CPS&IoT Security and Privacy. 3--14."},{"key":"e_1_3_2_1_62_1","volume-title":"Proceedings of the Singapore Cyber-Security Conference (SG-CRC)","author":"Urbina David","year":"2016","unstructured":"David Urbina, Jairo Giraldo, Nils Ole Tippenhauer, and Alvaro Cardenas. 2016. Attacking fieldbus communications in ICS: Applications to the SWaT testbed. In Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016. IOS Press, 75--89."},{"key":"e_1_3_2_1_63_1","volume-title":"Annual Computer Security Applications Conference. 442--453","author":"Wan Shengye","year":"2020","unstructured":"Shengye Wan, Mingshen Sun, Kun Sun, Ning Zhang, and Xu He. 2020. RusTEE: developing memory-safe ARM TrustZone applications. In Annual Computer Security Applications Conference. 442--453."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833604"},{"key":"e_1_3_2_1_65_1","volume-title":"IFIP International Conference on ICT Systems Security and Privacy Protection. Springer, 33--48","author":"Yoo Hyunguk","year":"2019","unstructured":"Hyunguk Yoo and Irfan Ahmed. 2019. Control logic injection attacks on industrial control systems. In IFIP International Conference on ICT Systems Security and Privacy Protection. Springer, 33--48."},{"key":"e_1_3_2_1_66_1","volume-title":"International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 109--132","author":"Yoo Hyunguk","year":"2019","unstructured":"Hyunguk Yoo, Sushma Kalle, Jared Smith, and Irfan Ahmed. 2019. Overshadow PLC to detect remote control-logic injection attacks. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 109--132."}],"event":{"name":"ASIA CCS '24: 19th ACM Asia Conference on Computer and Communications Security","location":"Singapore Singapore","acronym":"ASIA CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 19th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3645002","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:06Z","timestamp":1750290246000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3645002"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":65,"alternative-id":["10.1145\/3634737.3645002","10.1145\/3634737"],"URL":"https:\/\/doi.org\/10.1145\/3634737.3645002","relation":{},"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"2024-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}