{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:37:39Z","timestamp":1730259459734,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,27]]},"DOI":"10.1109\/icst60714.2024.00021","type":"proceedings-article","created":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T17:19:42Z","timestamp":1724779182000},"page":"140-150","source":"Crossref","is-referenced-by-count":0,"title":["MSGFuzzer: Message Sequence Guided Industrial Robot Protocol Fuzzing"],"prefix":"10.1109","author":[{"given":"Yang","family":"Zhang","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, CAS,Beijing Key Laboratory of IOT Information Security Technology,Beijing,China"}]},{"given":"Dongliang","family":"Fang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, CAS,Beijing Key Laboratory of IOT Information Security Technology,Beijing,China"}]},{"given":"Puzhuo","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, CAS,Beijing Key Laboratory of IOT Information Security Technology,Beijing,China"}]},{"given":"Laile","family":"Xi","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, CAS,Beijing Key Laboratory of IOT Information Security Technology,Beijing,China"}]},{"given":"Xiao","family":"Lu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, CAS,Beijing Key Laboratory of IOT Information Security Technology,Beijing,China"}]},{"given":"Xin","family":"Chen","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, CAS,Beijing Key Laboratory of IOT Information Security Technology,Beijing,China"}]},{"given":"Shuaizong","family":"Si","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, CAS,Beijing Key Laboratory of IOT Information Security Technology,Beijing,China"}]},{"given":"Limin","family":"Sun","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, CAS,Beijing Key Laboratory of IOT Information Security Technology,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"IFR Presents World Robotics Report 2022"},{"issue":"1-29","key":"ref2","first-page":"3","article-title":"Analysis of the cyber attack on the Ukrainian power grid","volume":"388","author":"Case","year":"2016","journal-title":"Electricity Information Sharing and Analysis Center (E-ISAC)"},{"key":"ref3","article-title":"TSMC Chip Maker Blames WannaCry Malware for Production Halt"},{"year":"2023","key":"ref4","article-title":"Stuxnet"},{"article-title":"Report: The state of industrial security in 2022","year":"2022","author":"Campbell","key":"ref5"},{"first-page":"268","article-title":"An Experimental Security Analysis of an Industrial Robot Controller","volume-title":"2017 IEEE Symposium on Security and Privacy (SP)","author":"Quarta","key":"ref6"},{"issue":"11","key":"ref7","first-page":"2312","article-title":"The Art, Science, and Engineering of Fuzzing: A Survey","volume-title":"IEEE Transactions on Software Engineering","volume":"47","author":"Manes"},{"key":"ref8","article-title":"AFLNET: A Greybox Fuzzer for Network Protocols | IEEE Conference Publication | IEEE Xplore"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895025"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3358227"},{"key":"ref11","article-title":"ICS Protocol Fuzzing: Coverage Guided Packet Crack and Generation I IEEE Conference Publication | IEEE Xplore"},{"key":"ref12","article-title":"boofuzz: Network Protocol Fuzzing for Humans - boofuzz 0.4.2 documentation"},{"key":"ref13","article-title":"Sulley | Read the Docs"},{"key":"ref14","article-title":"Welcome to Kittys documentation! - Kitty 0.7.1 documentation"},{"key":"ref15","article-title":"Peach Fuzzer"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1326304.1326313"},{"key":"ref17","article-title":"PropFuzz - An IT-security fuzzing framework for proprietary ICS protocols | IEEE Conference Publication | IEEE Xplore"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28865-9_18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3488028"},{"key":"ref20","article-title":"ISO 8373:2012"},{"year":"2023","key":"ref21","article-title":"Industrial robot"},{"key":"ref22","article-title":"ROKAE Robotics. Leading Robots Expert in Industrial, Commercial Scenarios"},{"key":"ref23","article-title":"ROKAE Academy_rokae Robotics. Leading Robots Expert in Industrial, Commercial Scenarios"},{"journal-title":"ABB Robotics, Vasteras, Sweden, 2014","article-title":"Technical reference manual: Rapid instructions, functions and data types","author":"Robotics","key":"ref24"},{"key":"ref25","article-title":"Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference | Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3192991"},{"year":"2023","key":"ref27","article-title":"Edit distance"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.21105\/joss.00205"},{"key":"ref29","article-title":"Semi-Supervised Log-Based Anomaly Detection via Probabilistic La-bel Estimation | IEEE Conference Publication | IEEE Xplore"},{"key":"ref30","first-page":"195","article-title":"Hierarchical Clustering","volume-title":"Introduction to HPC with MPI for Data Science, ser. Undergraduate Topics in Computer Science","author":"Nielsen","year":"2016"},{"key":"ref31","article-title":"XB7 _rokae Robotics. Leading Robots Expert in Industrial, Commercial Scenarios"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"102483","DOI":"10.1016\/j.sysarc.2022.102483","article-title":"Fuzzing proprietary protocols of programmable controllers to find vulnerabilities that affect physical control","volume":"127","author":"Liu","year":"2022","journal-title":"Journal of Systems Architecture"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23159"},{"key":"ref34","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2016.23415","article-title":"Towards Automated Dynamic Analysis for Linux-based Embedded Firmware","volume-title":"Proceedings 2016 Network and Distributed System Security Symposium","author":"Chen","year":"2016"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397376"},{"issue":"3","key":"ref36","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/s11416-019-00329-8","article-title":"Security of controlled manufacturing systems in the connected factory: the case of industrial robots","volume":"15","author":"Pogliani","year":"2019","journal-title":"Journal of Computer Virology and Hacking Techniques"},{"issue":"10","key":"ref37","first-page":"3629","article-title":"Fingerprinting Movements of Industrial Robots for Replay Attack Detection","volume-title":"IEEE Transactions on Mobile Computing","volume":"21","author":"Pu"}],"event":{"name":"2024 IEEE Conference on Software Testing, Verification and Validation (ICST)","start":{"date-parts":[[2024,5,27]]},"location":"Toronto, ON, Canada","end":{"date-parts":[[2024,5,31]]}},"container-title":["2024 IEEE Conference on Software Testing, Verification and Validation (ICST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10638518\/10638509\/10638619.pdf?arnumber=10638619","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T04:10:06Z","timestamp":1725250206000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10638619\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,27]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/icst60714.2024.00021","relation":{},"subject":[],"published":{"date-parts":[[2024,5,27]]}}}