{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T00:08:27Z","timestamp":1755994107598,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":64,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T00:00:00Z","timestamp":1700438400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"US Department of Transportation (USDOT)","award":["69A3552348332"],"award-info":[{"award-number":["69A3552348332"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,20]]},"DOI":"10.1145\/3689930.3695204","type":"proceedings-article","created":{"date-parts":[[2024,11,20]],"date-time":"2024-11-20T18:20:06Z","timestamp":1732126806000},"page":"37-45","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["By the Numbers: Towards Standard Evaluation Metrics for Programmable Logic Controllers' Defenses"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-4014-4776","authenticated-orcid":false,"given":"Efr\u00e9n","family":"L\u00f3pez-Morales","sequence":"first","affiliation":[{"name":"Texas A&amp;M University-Corpus Christi, Corpus Christi, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2409-3099","authenticated-orcid":false,"given":"Jacob","family":"Hopkins","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University-Corpus Christi, Corpus Christi, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5142-9750","authenticated-orcid":false,"given":"Alvaro A.","family":"Cardenas","sequence":"additional","affiliation":[{"name":"University of California, Santa Cruz, Santa Cruz, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4220-6560","authenticated-orcid":false,"given":"Ali","family":"Abbasi","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Saarland, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8931-6412","authenticated-orcid":false,"given":"Carlos","family":"Rubio-Medrano","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University-Corpus Christi, Corpus Christi, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,11,20]]},"reference":[{"volume-title":"Ghost in the PLC vs GhostBuster","author":"Abbasi Ali","key":"e_1_3_2_1_1_1","unstructured":"Ali Abbasi and Andrea Genuise. 2017. Ghost in the PLC vs GhostBuster: on the feasibility of detecting pin control attack in Programmable Logic Controllers. In Ghost in the PLC vs GhostBuster. Eindhoven University of Technology."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134618"},{"key":"e_1_3_2_1_3_1","volume-title":"Doors of durin: The veiled gate to siemens S7 silicon. BlackHat Europe","author":"Abbasi Ali","year":"2019","unstructured":"Ali Abbasi, Tobias Scharnowski, and Thorsten Holz. 2019. Doors of durin: The veiled gate to siemens S7 silicon. BlackHat Europe (2019)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00013"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453102"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00035"},{"key":"e_1_3_2_1_7_1","unstructured":"Thiago Alves. 2022. OpenPLC Runtime version 3. https:\/\/github.com\/ thiagoralves\/OpenPLC_v3 Accessed: 27-09--2023."},{"key":"e_1_3_2_1_8_1","unstructured":"Thiago Alves. 2023. webserver\/core\/main.cpp: Get REAL-TIME time values. https:\/\/github.com\/thiagoralves\/OpenPLC_v3\/pull\/201"},{"key":"e_1_3_2_1_9_1","unstructured":"arm. 2024. Cortex-R5. https:\/\/www.arm.com\/products\/silicon-ip-cpu\/cortexr\/ cortex-r5"},{"key":"e_1_3_2_1_10_1","unstructured":"ARM Developer. 2024. About the PMU. https:\/\/developer.arm.com\/ documentation\/ddi0488\/h\/performance-monitor-unit\/about-the-pmu"},{"key":"e_1_3_2_1_11_1","unstructured":"ARM Developer. 2024. DWT functional description. https: \/\/developer.arm.com\/documentation\/ddi0337\/h\/data-watchpoint-and-traceunit\/ dwt-functional-description"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/857076.857077"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOST55118.2023.10132957"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2013.04.004"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"William Bolton. 2015. Programmable logic controllers. Newnes.","DOI":"10.1016\/B978-0-12-802929-9.00001-7"},{"key":"e_1_3_2_1_16_1","volume-title":"Returnoriented programming: Exploitation without code injection. Black Hat 8","author":"Buchanan Erik","year":"2008","unstructured":"Erik Buchanan, Ryan Roemer, Stefan Savage, and Hovav Shacham. 2008. Returnoriented programming: Exploitation without code injection. Black Hat 8 (2008)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3471621.3471864"},{"key":"e_1_3_2_1_18_1","unstructured":"Euccas Chen. 2017. CPU Profiling Tools on Linux. https:\/\/euccas.github.io\/blog\/ 20170827\/cpu-profiling-tools-on-linux.html"},{"key":"e_1_3_2_1_19_1","unstructured":"CODESYS GmbH. 2022. CODESYS Profiler | CODESYS Store International. https: \/\/store.codesys.com\/en\/codesys-profiler.html"},{"key":"e_1_3_2_1_20_1","unstructured":"CODESYS GmbH. 2024. Multicore. https:\/\/help.codesys.com\/api-content\/2\/ codesys\/3.5.13.0\/en\/_cds_multi_core\/"},{"key":"e_1_3_2_1_21_1","unstructured":"CODESYS Runtime [n. d.]. CODESYS Runtime. https:\/\/www.codesys.com\/ products\/codesys-runtime.html. Accessed: 09-08--2024."},{"volume-title":"Slides from Linux Kongress","author":"De Melo Arnaldo Carvalho","key":"e_1_3_2_1_22_1","unstructured":"Arnaldo Carvalho De Melo. 2010. The new linux?perf?tools. In Slides from Linux Kongress, Vol. 18. 1--42."},{"key":"e_1_3_2_1_23_1","volume-title":"A plant-wide industrial process control problem. Computers & chemical engineering 17, 3","author":"Downs James J","year":"1993","unstructured":"James J Downs and Ernest F Vogel. 1993. A plant-wide industrial process control problem. Computers & chemical engineering 17, 3 (1993), 245--255."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s100090100054"},{"key":"e_1_3_2_1_25_1","unstructured":"Nicolas Falliere Liam O Murchu Eric Chien et al. 2011. W32. stuxnet dossier. White paper symantec corp. security response 5 6 (2011) 29."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2940890"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 30th Annual Computer Security Applications Conference. 126--135","author":"Dina","year":"2014","unstructured":"Dina Had?iosmanovi?, Robin Sommer, Emmanuele Zambon, and Pieter H Hartel. 2014. Through the eye of the PLC: semantic security monitoring for industrial processes. In Proceedings of the 30th Annual Computer Security Applications Conference. 126--135."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134081"},{"key":"e_1_3_2_1_29_1","unstructured":"Instrumentation Tools. 2024. Understanding the Scan Cycle of SIEMENS PLC. https:\/\/instrumentationtools.com\/understanding-the-scan-cycle-ofsiemens- plc\/#what-is-meant-by-a-scan-cycle"},{"key":"e_1_3_2_1_30_1","first-page":"824","article-title":"Snapshotter: Lightweight intrusion detection and prevention system for industrial control systems. In 2018 IEEE Industrial Cyber-Physical Systems (ICPS)","volume":"45","author":"Jin Chenglu","year":"2018","unstructured":"Chenglu Jin, Saeed Valizadeh, and Marten van Dijk. 2018. Snapshotter: Lightweight intrusion detection and prevention system for industrial control systems. In 2018 IEEE Industrial Cyber-Physical Systems (ICPS). IEEE 45 (2018), 824--829.","journal-title":"IEEE"},{"key":"e_1_3_2_1_31_1","volume-title":"ICSREF: A framework for automated reverse engineering of industrial control systems binaries. arXiv preprint arXiv:1812.03478","author":"Keliris Anastasis","year":"2018","unstructured":"Anastasis Keliris and Michail Maniatakos. 2018. ICSREF: A framework for automated reverse engineering of industrial control systems binaries. arXiv preprint arXiv:1812.03478 (2018)."},{"key":"e_1_3_2_1_32_1","unstructured":"Michael Kerrisk. 2024. perf(1)'Linux manual page. https:\/\/man7.org\/linux\/manpages\/ man1\/perf.1.html"},{"key":"e_1_3_2_1_33_1","unstructured":"Michael Kerrisk. 2024. readelf(1) ' Linux manual page. https:\/\/man7.org\/linux\/ man-pages\/man1\/readelf.1.html"},{"key":"e_1_3_2_1_34_1","unstructured":"Michael Kerrisk. 2024. top(1) ' Linux manual page. https:\/\/man7.org\/linux\/manpages\/ man1\/top.1.html"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41488-6_12"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-021-00426-w"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423356"},{"key":"e_1_3_2_1_38_1","unstructured":"Adam L. Lyon. 2017. Time profiling. https:\/\/lyon-fnal.github.io\/profilingbook\/ time-command.html"},{"key":"e_1_3_2_1_39_1","volume-title":"Cardenas","author":"L\u00f3pez-Morales Efr\u00e9n","year":"2024","unstructured":"Efr\u00e9n L\u00f3pez-Morales, Ulysse Planta, Carlos Rubio-Medrano, Ali Abbasi, and Alvaro A. Cardenas. 2024. SoK: Security of Programmable Logic Controllers. arXiv:2403.00280 [cs.CR] https:\/\/arxiv.org\/abs\/2403.00280"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523673"},{"key":"e_1_3_2_1_41_1","volume-title":"Ruimin Sun, Engin Kirda, and Long Lu.","author":"Mera Alejandro","year":"2022","unstructured":"Alejandro Mera, Yi Hui Chen, Ruimin Sun, Engin Kirda, and Long Lu. 2022. D-box: DMA-enabled compartmentalization for embedded applications. arXiv preprint arXiv:2201.05199 (2022)."},{"key":"e_1_3_2_1_42_1","unstructured":"Open Source PLC Software. 2024. 1.3 Installing OpenPLC Runtime on Windows. https:\/\/autonomylogic.com\/docs\/installing-openplc-runtime-on-windows\/"},{"key":"e_1_3_2_1_43_1","unstructured":"OpenPLC Overview -- OpenPLC [n. d.]. 1.1 OpenPLC Overview -- OpenPLC. https:\/\/openplcproject.com\/docs\/openplc-overview\/. Accessed: 09-08--2024."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2945520"},{"key":"e_1_3_2_1_45_1","volume-title":"Network and Distributed System Security Symposium (NDSS).","author":"R PICKREN, T SHEKARI, S","year":"2024","unstructured":"R PICKREN, T SHEKARI, S ZONOUZ, and R BEYAH. 2024. Compromising industrial processes using web-based programmable logic controller malware. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_46_1","volume-title":"Calculating the maximum execution time of real-time programs. Real-time systems 1, 2","author":"Puschner Peter","year":"1989","unstructured":"Peter Puschner and Ch Koza. 1989. Calculating the maximum execution time of real-time programs. Real-time systems 1, 2 (1989), 159--176."},{"key":"e_1_3_2_1_47_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Narayan Rajput Prashant Hari","year":"2023","unstructured":"Prashant Hari Narayan Rajput, Constantine Doumanidis, and Michail Maniatakos. 2023. {ICSPatch}: Automated Vulnerability Localization and {Non-Intrusive} Hotpatching in Industrial Control Systems using Data Dependence Graphs. In 32nd USENIX Security Symposium (USENIX Security 23). 6861--6876."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00162"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3690134.3694813"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3040237"},{"key":"e_1_3_2_1_51_1","unstructured":"Jonathan Salwan. 2023. ROPgadget Tool. hhttps:\/\/github.com\/JonathanSalwan\/ ROPgadget"},{"key":"e_1_3_2_1_52_1","unstructured":"Siemens. 2021. OB1 Scan Cycle Time. https:\/\/support.industry.siemens.com\/ forum\/WW\/en\/posts\/ob1-scan-cycle-time\/253590"},{"key":"e_1_3_2_1_53_1","unstructured":"Siemens. 2024. SIMATIC Controller Profiling. https:\/\/cache.industry.siemens. com\/dl\/files\/245\/109750245\/att_1165728\/v2\/109750245_S71500ProfilingTool_ DOC_V10_en.pdf"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2003.1201189"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:TIME.0000045319.20260.73"},{"key":"e_1_3_2_1_56_1","volume-title":"SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses. In 2021 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 385--402","author":"Sun Ruimin","year":"2021","unstructured":"Ruimin Sun, Alejandro Mera, Long Lu, and David Choffnes. 2021. SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses. In 2021 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 385--402."},{"key":"e_1_3_2_1_57_1","unstructured":"The Memory Protection Unit [n. d.]. The Memory Protection Unit. https:\/\/developer.arm.com\/documentation\/den0042\/a\/The-Memory-Protection-Unit. Accessed: 09-08--2024."},{"volume-title":"IEC 61131--3: Programming industrial automation systems","author":"Tiegelkamp Michael","key":"e_1_3_2_1_58_1","unstructured":"Michael Tiegelkamp and Karl-Heinz John. 2010. IEC 61131--3: Programming industrial automation systems. Springer."},{"key":"e_1_3_2_1_59_1","unstructured":"Vulnerability Disclosure Policy Template | CISA [n. d.]. Vulnerability Disclosure Policy Template | CISA. https:\/\/www.cisa.gov\/vulnerability-disclosure-policytemplate. Accessed: 09-08--2024."},{"key":"e_1_3_2_1_60_1","unstructured":"WAGO. 2024. Controller PFC200 (750--8217\/600-000) | WAGO USA. https:\/\/www.wago.com\/us\/controllers-bus-couplers-i-o\/controllerpfc200\/ p\/750--8217_600-000"},{"key":"e_1_3_2_1_61_1","unstructured":"WikiChip. 2020. Resident Set Size (RSS). https:\/\/en.wikichip.org\/wiki\/resident_ set_size#: :text=The%20resident%20set%20size%20(RSS is%20the%20virtual% 20set%20size."},{"key":"e_1_3_2_1_62_1","volume-title":"DIMVA 2019, Gothenburg, Sweden, June 19--20, 2019, Proceedings 16","author":"Yoo Hyunguk","year":"2019","unstructured":"Hyunguk Yoo, Sushma Kalle, Jared Smith, and Irfan Ahmed. 2019. Overshadow plc to detect remote control-logic injection attacks. In Detection of Intrusions and Malware, and Vulnerability Assessment: 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19--20, 2019, Proceedings 16. Springer, 109--132."},{"key":"e_1_3_2_1_63_1","volume-title":"Embedded devices security and firmware reverse engineering. Black Hat USA","author":"Zaddach Jonas","year":"2013","unstructured":"Jonas Zaddach and Andrei Costin. 2013. Embedded devices security and firmware reverse engineering. Black Hat USA (2013). https:\/\/media.blackhat.com\/us-13\/US-13-Zaddach-Workshop-on-Embedded- Devices-Security-and-Firmware-Reverse-Engineering-Slides.pdf. Accessed: 03--10--2023."},{"key":"e_1_3_2_1_64_1","unstructured":"Gong Zhou. 2023. CODESYS Tutorial: Getting the Actual Cycle Time of a Current Task. https:\/\/medium.com\/@sean.gongz\/how-to-get-current-task-actual-cycletime-in-codesys-267384bcd3b7"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Salt Lake City UT USA","acronym":"CCS '24"},"container-title":["Proceedings of the 2024 Workshop on Re-design Industrial Control Systems with Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3689930.3695204","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3689930.3695204","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:21:07Z","timestamp":1755973267000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3689930.3695204"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,20]]},"references-count":64,"alternative-id":["10.1145\/3689930.3695204","10.1145\/3689930"],"URL":"https:\/\/doi.org\/10.1145\/3689930.3695204","relation":{},"subject":[],"published":{"date-parts":[[2023,11,20]]},"assertion":[{"value":"2024-11-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}