{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T07:02:50Z","timestamp":1771916570566,"version":"3.50.1"},"reference-count":20,"publisher":"Zhejiang University Press","issue":"3","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front Inform Technol Electron Eng"],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1631\/fitee.2000709","type":"journal-article","created":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T13:03:18Z","timestamp":1648472598000},"page":"351-360","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Automatic protocol reverse engineering for industrial control systems with dynamic taint analysis","\u57fa\u4e8e\u52a8\u6001\u6c61\u70b9\u5206\u6790\u7684\u5de5\u4e1a\u63a7\u5236\u7cfb\u7edf\u534f\u8bae\u81ea\u52a8\u9006\u5411\u5de5\u7a0b\u5206\u6790"],"prefix":"10.1631","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4791-6847","authenticated-orcid":false,"given":"Rongkuan","family":"Ma","sequence":"first","affiliation":[]},{"given":"Hao","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Jingyi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Mufeng","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7207-6691","authenticated-orcid":false,"given":"Qiang","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Qingxian","family":"Wang","sequence":"additional","affiliation":[]}],"member":"635","published-online":{"date-parts":[[2022,3,26]]},"reference":[{"key":"ref1","article-title":"IEC104","volume-title":"Airpig2011","year":"2020"},{"key":"ref2","volume-title":"Network Protocol Analysis Using Bioinformatics Algorithms","author":"Beddoe","year":"2012"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590346"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315286"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99843-5_22"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939921"},{"key":"ref7","first-page":"199","article-title":"Discoverer: automatic protocol reverse engineering from network traces","volume-title":"Proc 16th USENIX Security Symp","author":"Cui","year":"2007"},{"key":"ref8","year":"2020","journal-title":"Freemodbus"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2017.06.005"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2019.108698"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397372"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/1308045"},{"key":"ref13","first-page":"29","article-title":"Automatic protocol format reverse engineering through context-aware monitored execution","volume-title":"Proc 15th Symp on Network and Distributed System Security","author":"Lin","year":"2008"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/dac18072.2020.9218603"},{"key":"ref15","year":"2020","journal-title":"MZ Automation GmbH, 2020. lib60870"},{"key":"ref16","author":"Nardella","year":"2020","journal-title":"Snap7"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2017.06.012"},{"key":"ref18","year":"2020","journal-title":"SharkFest, 2020. Wireshark"},{"key":"ref19","year":"2020","journal-title":"Stephane, 2020. libmodbus"},{"key":"ref20","first-page":"333","article-title":"PLC-sleuth: detecting and localizing PLC intrusions using control invariants","author":"Yang","year":"2020","journal-title":"23rd Int Symp on Research in Attacks, Intrusions and Defenses"}],"container-title":["Frontiers of Information Technology &amp; Electronic Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.2000709.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1631\/FITEE.2000709\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.2000709.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:48:12Z","timestamp":1771660092000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1631\/FITEE.2000709"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3]]},"references-count":20,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["1776"],"URL":"https:\/\/doi.org\/10.1631\/fitee.2000709","relation":{},"ISSN":["2095-9184","2095-9230"],"issn-type":[{"value":"2095-9184","type":"print"},{"value":"2095-9230","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3]]},"assertion":[{"value":"19 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 April 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 March 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Rongkuan MA, Hao ZHENG, Jingyi WANG, Mufeng WANG, Qiang WEI, and Qingxian WANG declare that they have no conflict of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethics guidelines"}}]}}