{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:25:09Z","timestamp":1730298309425,"version":"3.28.0"},"reference-count":62,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1109\/spw53761.2021.00058","type":"proceedings-article","created":{"date-parts":[[2021,7,8]],"date-time":"2021-07-08T19:55:55Z","timestamp":1625774155000},"page":"383-397","source":"Crossref","is-referenced-by-count":23,"title":["Empirical Study of PLC Authentication Protocols in Industrial Control Systems"],"prefix":"10.1109","author":[{"given":"Adeen","family":"Ayub","sequence":"first","affiliation":[{"name":"Virginia Commonwealth University,Department of Computer Science,Richmond,United States of America"}]},{"given":"Hyunguk","family":"Yoo","sequence":"additional","affiliation":[{"name":"The University of New Orleans,Department of Computer Science,New Orleans,United States of America"}]},{"given":"Irfan","family":"Ahmed","sequence":"additional","affiliation":[{"name":"Virginia Commonwealth University,Department of Computer Science,Richmond,United States of America"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.4251102"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2020.301013"},{"journal-title":"ATT&CK MITRE","year":"2020","key":"ref12"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30215-3_20"},{"journal-title":"TCPDUMP & LIBPCAP","year":"2021","key":"ref15"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/WCICSS.2016.7882935"},{"journal-title":"Wireshark tool","year":"2020","key":"ref14"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3450267.3450545"},{"key":"ref53","first-page":"723","article-title":"Exploiting siemens simatic s7 plcs","volume":"16","author":"beresford","year":"2011","journal-title":"Black Hat USA"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2014.7007754"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.325"},{"key":"ref55","first-page":"1","article-title":"Plc-blaster: A worm living solely in the plc","volume":"16","author":"spenneberg","year":"2016","journal-title":"Black Hat Asia"},{"journal-title":"Analysis of the Cyber Attack on the Ukrainian Power Grid","year":"2016","author":"lee","key":"ref10"},{"key":"ref54","first-page":"22","article-title":"Internet-facing PLCs-a new back orifice","author":"klick","year":"2015","journal-title":"BlackHat USA"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"57s","DOI":"10.1016\/j.diin.2017.06.012","article-title":"SCADA network forensics of the PCCC protocol","volume":"22","author":"senthivel","year":"2017","journal-title":"Digital Investigation"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23043"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664277"},{"key":"ref51","first-page":"110","article-title":"On ladder logic bombs in industrial control systems","author":"govil","year":"2017","journal-title":"Computer Security"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2017.34"},{"key":"ref46","article-title":"On Dynamic Malware Payloads Aimed at Programmable Logic Controllers","author":"mclaughlin","year":"2011","journal-title":"HOTSEC"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423356"},{"key":"ref48","first-page":"1","article-title":"Ghost in the plc designing an undetectable programmable logic controller rootkit via pin control attack","volume":"2016","author":"abbasi","year":"2016","journal-title":"Black Hat Europe'06"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382244"},{"key":"ref42","first-page":"3","author":"krotofil","year":"2019","journal-title":"Securing Industrial Control Systems"},{"journal-title":"DMZ","year":"2021","key":"ref41"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427660"},{"key":"ref43","first-page":"178","article-title":"A Rising Tide: Design Exploits in Industrial Control Systems","author":"bolshev","year":"2016","journal-title":"Proceedings of the 10th USENIX Conference on Offensive Technologies ser WOOT’16"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23313"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-97643-3_3"},{"key":"ref7","article-title":"Attacking the IEC61131 Logic Engine in Programmable Logic Controllers in Industrial Control Systems","author":"qasim","year":"2021","journal-title":"Crit Infrastructure Protect"},{"journal-title":"Attackers Deploy New ICS Attack Framework “TRITON” and Cause Operational Disruption to Critical Infrastructure","year":"2021","key":"ref9"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22312-0_3"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3018981.3018984"},{"key":"ref6","first-page":"109","article-title":"Overshadow Plc to Detect Remote Control-Logic Injection Attacks","author":"yoo","year":"2019","journal-title":"Detection of Intrusions and Malware and Vulnerability Assessment"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2019.23074"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05849-4_17"},{"journal-title":"Cryptography Length Recommendation","year":"2020","key":"ref35"},{"journal-title":"NDSS","article-title":"Securing Real-Time Microcontroller Systems through Customized Memory View Switching., author = Kim, Chung Hwan and Kim, Taegyu and Choi, Hongjun and Gu, Zhongshu and Lee, Byoungyoung and Zhang, Xiangyu and Xu, Dongyan","year":"2018","key":"ref34"},{"journal-title":"Arpalert","year":"2021","key":"ref37"},{"key":"ref36","first-page":"229","article-title":"Snort: Lightweight intrusion detection for networks","volume":"99","author":"roesch","year":"1999","journal-title":"LISA"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2011.2182653"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00034"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.113"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2015.2489184"},{"key":"ref2","first-page":"29","article-title":"W32.stuxnet dossier","volume":"5","author":"falliere","year":"2011","journal-title":"White Paper Symantec Corp Security Response"},{"key":"ref1","first-page":"38","article-title":"Gap analysis of intrusion detection in smart grids","author":"kush","year":"2011","journal-title":"2nd International Cyber Resilience Conference (ICRC 2011)"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389155"},{"journal-title":"ARPWATCH","year":"2021","key":"ref38"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2009.49"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176319"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23043"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2009.80"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00042"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/11663812_12"},{"key":"ref21","article-title":"A Rising Tide: Design Exploits in Industrial Control Systems","author":"bolshev","year":"2016","journal-title":"10th USENIX Workshop on Offensive Technologies (WOOT 16)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2013.85"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2011.23"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3302509.3311036"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICIInfS.2013.6731959"},{"key":"ref62","article-title":"Rogue7: Rogue Engineering-Station attacks on S7 Simatic PLCs","author":"biham","year":"2019","journal-title":"Black Hat USA"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2746266.2746268"}],"event":{"name":"2021 IEEE Security and Privacy Workshops (SPW)","start":{"date-parts":[[2021,5,27]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2021,5,27]]}},"container-title":["2021 IEEE Security and Privacy Workshops (SPW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9473902\/9474266\/09474296.pdf?arnumber=9474296","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T15:45:31Z","timestamp":1694792731000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9474296\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5]]},"references-count":62,"URL":"https:\/\/doi.org\/10.1109\/spw53761.2021.00058","relation":{},"subject":[],"published":{"date-parts":[[2021,5]]}}}