{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:49Z","timestamp":1750309609401,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100011660","name":"Idaho National Laboratory","doi-asserted-by":"publisher","award":["240997"],"award-info":[{"award-number":["240997"]}],"id":[{"id":"10.13039\/100011660","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,31]]},"DOI":"10.1145\/3672608.3707880","type":"proceedings-article","created":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T18:26:21Z","timestamp":1747247181000},"page":"271-278","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Relay Memory Analysis via Constraint Satisfaction Modeling for Malware Detection in the Electrical Power Grid"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-5987-5286","authenticated-orcid":false,"given":"Irma","family":"Rrushi","sequence":"first","affiliation":[{"name":"School of Engineering and Computer Science, Oakland University, Rochester, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8959-6861","authenticated-orcid":false,"given":"John","family":"Olijnyk","sequence":"additional","affiliation":[{"name":"School of Engineering and Computer Science, Oakland University, Rochester, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-4351-547X","authenticated-orcid":false,"given":"Kawthar","family":"Badran","sequence":"additional","affiliation":[{"name":"School of Engineering and Computer Science, Oakland University, Rochester, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8874-5554","authenticated-orcid":false,"given":"Julian","family":"Rrushi","sequence":"additional","affiliation":[{"name":"School of Engineering and Computer Science, Oakland University, Rochester, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Introduction to Algorithms","author":"Cormen Thomas H.","unstructured":"Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein. 2009. Introduction to Algorithms (3rd ed.). Pearson.","edition":"3"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 24th Networks and Distributed Systems Security Symposium (NDSS).","author":"Garcia Luis","year":"2017","unstructured":"Luis Garcia, Ferdinand Brasser, Mehmet H. Cintuglu, Ahmad-Reza Sadeghi, Osama Mohammed, and Saman Zonouz. 2017. Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit. In Proceedings of the 24th Networks and Distributed Systems Security Symposium (NDSS)."},{"key":"e_1_3_2_1_3_1","unstructured":"Jim Guinn Luis Luque and Josh Ray. 2017. Crashoverride\/Industroyer Malware Assessment. Technical Report. iDefense. Available online."},{"key":"e_1_3_2_1_4_1","unstructured":"Robert M. Lee Michael J. Assante and Tim Conway. 2016. Analysis of the Cyber Attack on the Ukrainian Power Grid. Defense use case white paper."},{"key":"e_1_3_2_1_5_1","volume-title":"Monitoring Security of Networked Control Systems: It's the Physics","author":"McParland Chuck","year":"2014","unstructured":"Chuck McParland, Sean Peisert, and Anna Scaglione. 2014. Monitoring Security of Networked Control Systems: It's the Physics. IEEE Security & Privacy 12 (Nov 2014), 32\u201339. Issue 6."},{"key":"e_1_3_2_1_6_1","volume-title":"Daniel Kapellmann Zafra, and Dan Caban","author":"Miller Steve","year":"2019","unstructured":"Steve Miller, Nathan Brubaker, Daniel Kapellmann Zafra, and Dan Caban. 2019. TRITON Actor TTP Profile, Custom Attack Tools, Detections, and ATT&CK Mapping. Technical Report. FireEye. Available online."},{"key":"e_1_3_2_1_7_1","volume-title":"Design and Emulation of Physics-Centric Cyberattacks on an Electrical Power Transformer","author":"Olijnyk John","year":"2022","unstructured":"John Olijnyk, Benjamin Bond, and Julian Rrushi. 2022. Design and Emulation of Physics-Centric Cyberattacks on an Electrical Power Transformer. IEEE Access 10 (Jan 2022), 15227\u201315246."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368310.1368334"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 1999 IEEE Symposium on Security and Privacy","author":"Rrushi Julian","year":"2009","unstructured":"Julian Rrushi. 2009. Exploiting Physical Process Internals for Network Intrusion Detection in Process Control Networks. In Proceedings of the 1999 IEEE Symposium on Security and Privacy (Knoxville, Tennessee, USA)."},{"key":"e_1_3_2_1_11_1","volume-title":"Artificial Intelligence: A Modern Approach","author":"Russell Stuart","year":"2020","unstructured":"Stuart Russell and Peter Norvig. 2020. Artificial Intelligence: A Modern Approach (4th ed.). Pearson.","edition":"4"},{"key":"e_1_3_2_1_13_1","volume-title":"International Journal of Critical Infrastructure Protection 44 (May","author":"Tarazi Hussam","year":"2024","unstructured":"Hussam Tarazi, Sara Sutton, John Olinjyk, Benjamin Bond, and Julian Rrushi. 2024. A watchdog model for physics-based anomaly detection in digital substations. International Journal of Critical Infrastructure Protection 44 (May 2024). Issue C."},{"volume-title":"Proceedings of the 11th Annual Cyber and Information Security Research Conference","author":"Rayford","key":"e_1_3_2_1_14_1","unstructured":"Rayford B. Vaughn and Tommy Morris. 2016. Addressing Critical Industrial Control System Cyber Security Concerns via High Fidelity Simulation. In Proceedings of the 11th Annual Cyber and Information Security Research Conference (Oak Ridge, TN, USA) (CISRC '16). Association for Computing Machinery, New York, NY, USA, Article 12, 4 pages."},{"volume-title":"Proceedings of the 1999 IEEE Symposium on Security and Privacy. 133\u2013145","author":"Warrender C.","key":"e_1_3_2_1_15_1","unstructured":"C. Warrender, S. Forrest, and B. Pearlmutter. 1999. Detecting intrusions using system calls: alternative data models. In Proceedings of the 1999 IEEE Symposium on Security and Privacy. 133\u2013145."},{"key":"e_1_3_2_1_16_1","volume-title":"Bing Liu, and Kai Xu.","author":"Yahya Mohammad","year":"2020","unstructured":"Mohammad Yahya, Nasir Sharaf, Julian Rrushi, Ho Ming Tay, Bing Liu, and Kai Xu. 2020. Physics Reasoning for Intrusion Detection in Industrial Networks. In In Proceedings of the 2nd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA) (Atlanta, GA, USA). 273\u2013283."}],"event":{"name":"SAC '25: 40th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Catania International Airport Catania Italy","acronym":"SAC '25"},"container-title":["Proceedings of the 40th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707880","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672608.3707880","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672608.3707880","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:57:33Z","timestamp":1750298253000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707880"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,31]]},"references-count":14,"alternative-id":["10.1145\/3672608.3707880","10.1145\/3672608"],"URL":"https:\/\/doi.org\/10.1145\/3672608.3707880","relation":{},"subject":[],"published":{"date-parts":[[2025,3,31]]},"assertion":[{"value":"2025-05-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}